The European Commission proposed to launch the new Joint Cyber Unit
The European Union Agency for Cybersecurity welcomes the European Commission proposal to launch the new Joint Cyber Unit. The European...
The European Union Agency for Cybersecurity welcomes the European Commission proposal to launch the new Joint Cyber Unit. The European...
The LV ransomware operators repurposed a REvil binary to create their own strain and launch a ransomware-as-a-service (RaaS). A threat...
LoadLibrary for offensive operations. How does is work?https://www.mdsec.co.uk/2021/06/bypassing-image-load-kernel-callbacks/UsageDARKMODULE DarkModule = DarkLoadLibrary( LOAD_LOCAL_FILE, // control flags L"TestDLL.dll", // local dll path,...
CamOver is a camera exploitation tool that allows to disclosure network camera admin password. FeaturesExploits vulnerabilities in most popular camera...
VMware patched a high-severity vulnerability in VMware Tools for Windows that attackers could exploit to execute arbitrary code with elevated...
A week after the law enforcement operation that targeted the Clop ransomware operators, the gang is back into action. A...
Palo Alto Networks addresses a critical improper authorization vulnerability (CVE-2021-3044) affecting its Cortex XSOAR security orchestration solution, automation and response...
A critical vulnerability, tracked as CVE-2021-20019, in SonicWall VPN appliances was only partially patched last year and could allow a remote...
D3FEND is a new project promoted by MITRE Corporation to add defensive cybersecurity techniques to the ATT&CK Framework. D3FEND is...
DarkRadiation is a new strain of ransomware implemented in Bash that targets Linux and Docker cloud containers and leverages Telegram...
This project aims to assist in the search for leaked passwords while maintaining a high level of privacy using the...
Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods. I have included...
DirtyMoe is a Windows botnet that is rapidly growing, it passed from 10,000 infected systems in 2020 to more than...
The Tor Project released Tor Browser 10.0.18 that addresses a flaw that allows sites to track users by fingerprinting the...
Boffins developed a tool dubbed DroidMorph that provides morphing of Android applications (APKs) and allows to create Android apps (malware/benign)...
The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more...
Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the importance of...
Squalr Official Website Join us on our Discord Channel Squalr is performant Memory Editing software that allows users to create...
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps. Using raw RDP...
The US National Security Agency (NSA) released guidance for securing Unified Communications/Voice and Video over IP Systems (VVoIP). NSA last...
The British intelligence agency MI5 seized Boris Johnson ‘s phone over concerns related to the availability of his number online...
Jaroslaw Kaczynski, the leader of the Poland Law and Justice party, blames Russia for the recent cyberattack targeting top Polish politicians. Jaroslaw...
This project is a PoC code to use Pass-the-Hash for authentication on a local Named Pipe user Impersonation. There also...
A tool for simplifying the process of researching file hashes, IP addresses, and other indicators of compromise (IOCs). FeaturesLook up...