efiXplorer – IDA Plugin For UEFI Firmware Analysis And Reverse Engineering Automation
efiXplorer - IDA plugin for UEFI firmware analysis and reverse engineering automation Supported versions of Hex-Rays products: everytime we focus...
efiXplorer - IDA plugin for UEFI firmware analysis and reverse engineering automation Supported versions of Hex-Rays products: everytime we focus...
The Biden administration announced it will work with 30 countries, including NATO allies and G7 partners, to curb global cybercrime....
LeakDB is a tool set designed to allow organizations to build and deploy their own internal plaintext "Have I Been...
Threat actors stole funds from the accounts of more than 6,000 users of the crypto exchange Coinbase exploiting a flaw...
The Flubot Android malware is now leveraging fake security updates warning to trick users into installing the malicious code. Threat...
kekeo is a little toolbox I have started to manipulate Microsoft Kerberos in C (and for fun) ASN.1 libraryIn kekeo,...
Telecom Italia Red Team Research (RTR) laboratory led by Massimiliano Brolli reported three new flaws in Oracle GlassFish and Nokia...
pwncat is a post-exploitation platform for Linux targets. It started out as a wrapper around basic bind and reverse shells...
A baby allegedly received inadequate childbirth health care, and later died, at an Alabama Springhill Medical Center due to a...
Experts warn of a new Hydra banking trojan campaign targeting European e-banking platform users, including the customers of Commerzbank. ...
Luxury retail company Neiman Marcus Group has announced this week that it has suffered a data breach that impacted customer...
Certify is a C# tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS). @harmj0y and @tifkin_...
Google rolled out urgent security updates to address two new actively exploited zero-day vulnerabilities in its Chrome browser. Google this...
Threat actors could exploit a stored cross-site scripting (XSS) vulnerability in Apple AirTag product to lure users to malicious websites....
This repository contains some utilities for playing with PKINIT and certificates. The tools are built on minikerberos and impacket. Accompanying...
Security researchers devised a new attack method against iPhone owners using Apple Pay and Visa payment cards. Boffins from the...
14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties Original post @...
SharpML is a proof of concept file share data mining tool using Machine Learning in Python and C#. The tool...
Threat actors are actively exploiting the recently disclosed CVE-2021-26084 RCE vulnerability in Atlassian Confluence deployments. Trend Micro researchers have spotted...
The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider...
Facebook released Mariana Trench, an internal open-source tool that can be used to identify vulnerabilities in Android and Java applications....
The security researcher Jose Rodriguez discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet...
WebStor is a tool implemented in Python under the MIT license for quickly enumerating all websites across all of your...
Kodex (Community Edition - CE) is an open-source toolkit for privacy and security engineering. It helps you to automate data...