Doldrums – A Flutter/Dart Reverse Engineering Tool
To flutter: to move in quick, irregular motions, to beat rapidly, to be agitated.Doldrums: a period of stagnation. Doldrums is...
To flutter: to move in quick, irregular motions, to beat rapidly, to be agitated.Doldrums: a period of stagnation. Doldrums is...
This is an integration of the Ghidra decompiler and Sleigh Disassembler for rizin. It is solely based on the decompiler...
Cisco addressed a vulnerability in the Firepower Device Manager (FDM) On-Box software that allows attackers to execute arbitrary code on...
A flaw in the GitHub Actions workflow for PyPI ’s source repository could be exploited to potentially execute arbitrary code...
Did you ever stop to think that the office smart TV used for company presentations, Zoom meetings, and other work-related...
Cybersecurity researchers disclosed multiple flaws, dubbed PwnedPiper, that left a widely-used pneumatic tube system (PTS) vulnerable to attacks. Researchers from...
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to...
The PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their...
Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. BleepingComputer found evidence that...
An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under...
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance...
A PowerShell script to collect memory and (triage) disk forensics for incident response investigations. The script leverages a network share,...
Kaspersky experts spotted a previously undocumented Chinese-speaking threat actor, tracked as GhostEmperor, that is targeting Microsoft Exchange flaws in attacks...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure...
Microsoft Office 365 email accounts of employees at 27 US Attorneys’ offices were breached by the Russia-linked SVR group as part of...
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future...
Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial...
Experts spotted a new strain of Android banking Trojan dubbed Vultur that uses screen recording and keylogging for the capturing...
Researcher published an exploit code for a high-severity privilege escalation flaw (CVE-2021-3490) in Linux kernel eBPF on Ubuntu machines. The...
LightMe is a Simple HTTP Server serving Powershell Scripts/Payloads after Obfuscate them and run obfuscation as a service in backgroud...
rtl_433 (despite the name) is a generic data receiver, mainly for the 433.92 MHz, 868 MHz (SRD), 315 MHz, 345...
Estonia ‘s police arrested a man from Tallinn that is suspected to be the hacker who stole 286K ID scans...
The recent attack against Iran’s national railway system was caused by a wiper malware dubbed Meteor and not by a ransomware as initially thought....