Bbscope – Scope Gathering Tool For HackerOne, Bugcrowd, And Intigriti!
The ultimate scope gathering tool for HackerOne, Bugcrowd, and Intigriti by sw33tLie. Need to grep all the large scope domains...
The ultimate scope gathering tool for HackerOne, Bugcrowd, and Intigriti by sw33tLie. Need to grep all the large scope domains...
Golang malware development framework IntroductionColdFire provides various methods useful for malware development in Golang. Most functions are compatible with both...
link is a command and control framework written in rust. Currently in beta. Introductionlink provides MacOS, Linux and Windows implants...
A large number of popular websites including Reddit, Spotify, PayPal, GitHub, gov.uk, CNN, and the BBC are currently facing problems...
Trojan Shield operation: The FBI and Australian Federal Police ran an encrypted chat platform that was used by crime gangs...
US officials announced to have recovered most of the $4.3 million ransom that Colonial Pipeline paid to the DarkSide ransomware...
RockYou2021, the largest password compilation of all time has been leaked on a popular hacker forum, it contains 8.4 billion...
Siloscape is a new strain of malware that targets Windows Server containers to execute code on the underlying node and...
Some people change their SSH port on their servers so that it is slightly harder to find for bots or...
RedWarden - Flexible CobaltStrike Malleable Redirector(previously known as proxy2's malleable_redirector plugin) Let's raise the bar in C2 redirectors IR resiliency,...
Ukraine warned of a “massive” spear-phishing campaign carried out by Russia-linked threat actors against its government and private businesses. Three...
Researchers at cybersecurity firm Shielder discovered a remote code execution on QNAP Q’center through a manipulated QPKG installation package. Researchers...
Cybercriminals in Russian underground forums have been invited to take part in competitions for hacking cryptocurrency and NFT. Several Russian...
Krane is a simple Kubernetes RBAC static analysis tool. It identifies potential security risks in K8s RBAC design and makes...
This tool gives blue teams, SOC's, researchers and companies the ability to detect the active mutations of their domains, thus...
Check Point Research (CPR) said that the Chinese APT group SharpPanda spent three years developing a new backdoor to spy...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The REvil ransomware operators said in an interview on the “Russian OSINT” Telegram channel that they accidentally targeted United States-based...
The US Department of Justice (DOJ) announced the arrest of a Latvian woman for her alleged role in the development...
This is an IN PROGRESS persistance tool using Windows Background Intelligent Transfer Service (BITS). Functionality: File Download, File Exfiltration, File...
Cyble researchers investigated a recent attack on an India-based IT firm that was hit by the BlackCocaine Ransomware gang. Recently Cyber researchers for Cyble...
The U.S. Department of Justice was to assign investigation on ransomware attacks the same priority as terrorism in the wake...
The U.S. CISA announced the availability of a new guide for cyber threat intelligence experts on the use of the...
Hackers are actively scanning the Internet for VMware vCenter servers vulnerable against a critical RCE flaw recently fixed by VMware....