Facebook released Mariana Trench tool to find flaws in Android and Java apps
Facebook released Mariana Trench, an internal open-source tool that can be used to identify vulnerabilities in Android and Java applications....
Facebook released Mariana Trench, an internal open-source tool that can be used to identify vulnerabilities in Android and Java applications....
The security researcher Jose Rodriguez discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet...
WebStor is a tool implemented in Python under the MIT license for quickly enumerating all websites across all of your...
Kodex (Community Edition - CE) is an open-source toolkit for privacy and security engineering. It helps you to automate data...
Security researchers uncovered a massive malware operation, dubbed GriftHorse, that has already infected more than 10 million Android devices worldwide....
The U.S. CISA and the NSA agencies have published guidance for securely using virtual private network (VPN) solutions. The U.S....
Russian media reported that the police made searches in the Moscow office of security firm Group-IB apparently linked to an...
Experts spotted a new variant of the FinFisher surveillance spyware that is able to hijack and replace the Windows UEFI...
Trend Micro has addressed a critical authentication bypass vulnerability, tracked as CVE-2021-36745, affecting the ServerProtect solution. Trend Micro has released security patches...
LittleCorporal: A C# Automated Maldoc Generator C:LittleCorporalbinRelease>LittleCorporal.exe C:beacon.bin explorer.exe.____ .__ __ __ .__ _________ .__| | |__|/ |__/ |_| |...
SharpSpray is a Windows domain password spraying tool written in .NET C#. IntroductionSharpSpray is a C# port of DomainPasswordSpray with...
An exploit for the recently disclosed CVE-2021-22005 vulnerability in VMware vCenter was publicly released, threat actors are already using it....
Microsoft discovered new custom malware, dubbed FoggyWeb, used by the Nobelium cyberespionage group to implant backdoor in Windows domains. Microsoft...
ERMAC is a new Android banking Trojan that can steal financial data from 378 banking and wallet apps. Researchers from...
Researchers spotted a new malware, dubbed BloodyStealer, that could allow stealing accounts for multiple gaming platforms. Researchers from Kaspersky have...
Researchers from the Italian cybersecurity firm Shielder found a remote code execution vulnerability in Visual Studio Code Remote Development Extension....
StreamDivert is a tool to man-in-the-middle or relay in and outgoing network connections on a system. It has the ability...
CloudQuery transforms your cloud infrastructure into queryable SQL for easy monitoring, governance and security.What is CloudQuery and why use it?CloudQuery...
Cybersecurity researchers spotted a new version of the Jupyter infostealer which is distributed via MSI installers. Cybersecurity researchers from Morphisec...
Telegram is becoming an essential platform for cybercriminal activities, crooks use it but and sell any kind of stolen data...
German Federal Office for Information Security is launching an investigation into the cybersecurity of certain Chinese mobile phones. German Federal...
Lightweight UNIX backdoor for ethical hacking. Useful for red team engagements and CTFs. Something I wrote a few years ago...
中文版本(Chinese version) About DongTai IASTDongTai IAST is an open-source passive interactive security testing (IAST) product. It uses dynamic hooks and...
Last month, the Port of Houston, one of the major US ports, was hit by a cyber attack allegedly orchestrated...