adalanche – Active Directory ACL Visualizer and Explorer
Tags: API Documentation, Access, Active Directory, Analysis, Binary, LDAP, Linux, Max, Memory, Parameter, Reverse, Takeover, Windows, pwned, Adalancheadalanche - Active...
Tags: API Documentation, Access, Active Directory, Analysis, Binary, LDAP, Linux, Max, Memory, Parameter, Reverse, Takeover, Windows, pwned, Adalancheadalanche - Active...
The Federal Bureau of Investigation (FBI) published a flash alert related to the operations of the Hive ransomware gang. The...
Ragnarok ransomware operators are ceasing their operations and released the master key that can allow their victims to decrypt files...
Researchers disclosed five vulnerabilities in B. Braun ‘s Infusomat Space Large Volume Pump and SpaceStation that could be remotely hacked....
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released five malware analysis reports (MARs) related to samples found on compromised...
Cisco addressed a critical security vulnerability in the Application Policy Infrastructure Controller (APIC) interface used in its Nexus 9000 Series...
Software firm Kaseya addressed Kaseya Unitrends zero-day vulnerabilities that were reported by security researchers at the Dutch Institute for Vulnerability...
BeaconEye scans running processes for active CobaltStrike beacons. When processes are found to be running beacon, BeaconEye will monitor each...
Perform Google Dork search with Dorkify Google DorkingGoogle dorking is a hacker technique that uses Google Search to find security...
Documents and personal details of residents of the small Swiss town Rolle, on the shores of Lake Geneva, were stolen...
VMware released security patches to address multiple vulnerabilities in vRealize Operations, including four high severity flaws. VMware addressed multiple vulnerabilities...
F5 has addressed more than a dozen severe vulnerabilities in its BIG-IP networking device, including one rated as critical severity...
Financially motivated threat actor FIN8 employed a previously undocumented backdoor, tracked as ‘Sardonic,’ in recent attacks. The financially motivated threat...
SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing...
PowerShell toolkit for auditing Active Directory Certificate Services (AD CS). It is built on top of PKISolution's PSPKI toolkit (Microsoft...
Threat actors claim to have a database containing private information on roughly 70 million AT&T customers, but the company denies...
Experts spotted a modified version of WhatsApp for Android, which offers extra features, but that installs the Triada Trojan on...
The South Korean multinational Samsung revealed that it can disable its Samsung TV sets remotely using the TV Block feature. Samsung...
The OpenSSL Project patched a high-severity vulnerability, tracked as CVE-2021-3711, that can allow an attacker to change an application’s behavior...
Citizen Lab uncovered a new zero-click iMessage exploit that was used to deploy the NSO Group’s Pegasus spyware on devices belonging...
Passive DNS collection and monitoring built with Golang, Clickhouse and Grafana: dnsmonster implements a packet sniffer for DNS traffic. It...
Go scripts for finding an API key / some keywords in repository Update V1.0.1Removing some checkers Adding example file contains...
The FBI shared info about OnePercent Group that has been actively targeting US organizations in ransomware attacks since at least...
Researchers warn that threat actors are actively exploiting Realtek SDK vulnerabilities since their technical details were publicly disclosed. Researchers from SAM Seamless...