Karta – Source Code Assisted Fast Binary Matching Plugin For IDA
"Karta" (Russian for "Map") is an IDA Python plugin that identifies and matches open-sourced libraries in a given binary. The...
"Karta" (Russian for "Map") is an IDA Python plugin that identifies and matches open-sourced libraries in a given binary. The...
SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the U.S. and...
Microsoft has fixed the Azurescape issue, a flaw in Azure Container Instances that allows to take over containers of other...
In case you don’t check our commit history on our GitHub on a daily basis, Empire 4.1 and Starkiller 1.9 were released to...
WWWGrep is a rapid search “grepping” mechanism that examines HTML elements by type and permits focused (single), multiple (file based...
Enumerate Domain Data is designed to be similar to PowerView but in .NET. PowerView is essentially the ultimate domain enumeration...
Security researchers from Broadcom’s Symantec linked a previously undocumented backdoor to the Chinese Grayfly operation. Experts from Broadcom’s Symantec linked...
The United Nations this week confirmed that its computer networks were hit by a cyberattack earlier this year, as first...
A Canadian man, who helped North Korean threat actors to launder stolen funds, plead guilty to laundering tens of millions...
The massive DDoS attack that has been targeting the internet giant Yandex was powered b a completely new botnet tracked...
This tool compiles some necessary tools for wifi auditing in a unix bash script with a user friendly interface....
Credits to Nick Aleks for the logo!How does it work?graphw00f (inspired by wafw00f) is the GraphQL fingerprinting tool for GQL...
CyberNews researchers identified more than 2 million web servers worldwide still running on outdated and vulnerable versions of Microsoft Internet...
The financially motivated TeamTNT hacking group expanded its arsenal with new tools used to target thousands of victims worldwide. Researchers...
The Russian internet service provider Yandex is under a massive distributed denial-of-service (DDoS) attack that began last week. The Russian...
Zoho urges customers to address an authentication bypass vulnerability in its ManageEngine ADSelfService Plus that is actively exploited in the...
A threat actor that goes online with the moniker ‘Sangkancil’ claims to have stolen the personal information of 7 million...
Groove gang leaked online Fortinet credentials that could be used to breach networks of organizations using the compromised devices. The financially...
GUI version: Solution ArchitectureSharpStrike is composed of three main projects ServiceLayer -- Provides core functionality and consumed by the UI...
TREVORproxy is a SOCKS proxy that round-robins requests through SSH hosts. TREVORspray is a A featureful Python O365 sprayer based...
Russian communications watchdog Roskomnadzor tightens control of its citizens and blocked access to six virtual private networks (VPNs), including NordVPN...
Microsoft warns of a zero-day vulnerability in Internet Explorer that is actively exploited by threat actors using weaponized Office docs....
Germany has protested to Russia over attempts to steal data from lawmakers and use them to spread disinformation ahead of...
The leak site of the popular REvil ransomware gang is it is not clear if the group resumed operations or...