SlackPirate – Slack Enumeration And Extraction Tool – Extract Sensitive Information From A Slack Workspace
This is a tool developed in Python which uses the native Slack APIs to extract 'interesting' information from a Slack...
This is a tool developed in Python which uses the native Slack APIs to extract 'interesting' information from a Slack...
A new Linux botnet uses Tor through a network of proxies using the Socks5 protocol, abuses legitimate DevOps tools, and other emerging techniques....
One of the lesser-known features in Empire is the ability to use alternative Command and Control (C2) methods. Specifically, we...
Announcement post ipcdump is a tool for tracing interprocess communication (IPC) on Linux. It covers most of the common IPC...
CrossLinked is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from a target organization....
A new ransomware strain dubbed Qlocker is infecting hundreds of QNAP NAS devices every day and demanding a $550 ransom...
Evil Maid Attack – Weaponizing an harmless vacuum cleaner hiding within it a small Rogue Device such as a Raspberry...
The Darkside ransomware gang is enhancing its extortion tactics to interfere with the valuation of stocks of companies that are...
VulnerableCode is a free and open database of FOSS software package vulnerabilities and the tools to create and keep the...
BuildTo build this project, run the make command from the root folder. Quick BuildTo run quick build for Linux, you...
The importance of carrying out a careful risk and impact assessment in order to safeguard the security of the information...
Cellebrite mobile forensics tool Ufed contains multiple flaws that allow arbitrary code execution on the device, SIGNAL creator warns. Moxie...
Researchers from Human Security have uncovered a huge botnet of Android devices being used to conduct fraud in the connected...
Cybersecurity firm Trend Micro revealed that a threat actor is actively exploiting a flaw, tracked as CVE-2020-24557, in its antivirus solutions...
During an undercover interview, a CyberNews researcher tricked ransomware operators affiliated with Ragnar Locker into revealing their ransom payout structure,...
A WhatsApp malware dubbed WhatsApp Pink is able to automatically reply to victims’ Signal, Telegram, Viber, and Skype messages. A WhatsApp...
dnspeep lets you spy on the DNS queries your computer is making. Here's some example output: $ sudo dnspeepquery name...
Overlord provides a python-based console CLI which is used to build Red Teaming infrastructure in an automated way. The user...
The REvil ransomware operators are attempting to blackmail Apple after they has allegedly stolen product blueprints of the IT giant...
Security vendor SonicWall has addressed three zero-day vulnerabilities affecting both its on-premises and hosted Email Security products. SonicWall is warning its customers...
At least one China-linked APT group exploited a new zero-day flaw in Pulse Secure VPN equipment to break into the...
The popular cyber security expert Luca Bongiorni demonstrated how to hack an X-Ray Machine using his WHIDelite tool. Recently I...
Researchers from security firm Group-IB have detected a large-scale scam campaign targeting Facebook Messenger users all over the world. Group-IB...
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs. cause Xencrypt is not...