Rconn – Rconn Is A Multiplatform Program For Creating Generic Reverse Connections
rconn (r conn) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT...
rconn (r conn) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT...
A simple scanner/exploitation tool written in GO which automatically exploits known and existing gadgets (checks for specific variables in the...
Threat actors target Kubernetes installs via Argo Workflows to cryptocurrency miners, security researchers from Intezer warn. Researchers from Intezer uncovered...
XCSSET macOS malware continues to evolve, now it is able to steal login information from multiple apps, including Telegram and...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Japanese researchers spotted an Olympics-themed wiper targeting Japanese users ahead of the 2021 Tokyo Olympics. Tokyo Olympics could be a...
This project's goal is to be simple to create and destroy your own VPN service using WireGuard.PrerequisitesTerraform >= 1.0.0 Ansible...
Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once. PurposeBrute-forcing website...
A researcher found a flaw in Windows OS, tracked as PetitPotam, that can be exploited to force remote Windows machines...
Estonian hacker Pavel Tsurkan has pleaded guilty in a United States court to the counts of computer fraud and of...
WizCase’s team of ethical hackers, led by Ata Hakçıl, has found a major breach exposing a number of US cities, all...
How businesses can benefit from the adoption of an identity and access management solution. Businesses that use outdated manual processes...
The software provider Kaseya announced to have obtained a universal decryptor for the REvil ransomware. Earlier this month, a massive...
The Threat Report Portugal: Q1 2021 compiles data collected on the malicious campaigns that occurred from April to June, Q2,...
In0ri is a defacement detection system utilizing a image-classification convolutional neural network. IntroductionWhen monitoring a website, In0ri will periodically take...
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email...
Have you ever wanted a simple, easy and stealth bypass for multiple classes of security products? pstf^2 (pronounced pstf-square) is...
Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints.IntroductionJMX stands for...
Researchers from threat intelligence firm Group-IB helps Dutch police identify members of phishing developer gang known as Fraud Family. Group-IB,...
U.S. CISA released an alert today about several stealth malware samples that were found on compromised Pulse Secure devices. The...
A database belonging to TicketClub Italy, a company providing coupons platform for offline purchases, is available for sale on darkweb...
Experts found a DB containing sensitive health insurance data belonging to customers of US insurance giant Humana. An SQL database...
French cyber-security agency ANSSI warned of an ongoing cyberespionage campaign aimed at French organizations carried out by China-linked APT31 group....
Why crack hashes when you can bust them?FeaturesAutomatic hash type identification Supports MD5, SHA1, SHA256, SHA384, SHA512 Can extract &...