Creepy – A Geolocation OSINT Tool. Offers Geolocation Information Gathering Through Social Networking Platforms
This project is currently not maintained. I haven't put any work on it since 2016 and with the current state...
This project is currently not maintained. I haven't put any work on it since 2016 and with the current state...
The number of vulnerabilities discovered in industrial control system (ICS) products surged in 2020, security firm Claroty reports. According to...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The website, and publisher of books, courses and articles for web developers, SitePoint discloses a data breach that impacted 1M...
Critical flaws in the Realtek RTL8195A Wi-Fi module could have been exploited to gain root access and take over devices’...
ExecuteAssembly is an alternative of CS execute-assembly, built with C/C++ and it can be used to Load/Inject .NET assemblies by;...
Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues...
Google removed the popular The Great Suspender from the official Chrome Web Store for containing malware and deactivated it from the...
Packaging giant WestRock revealed this week that the recent ransomware attack impacted the company’s IT and operational technology (OT) systems. American corrugated packaging company...
Trucking and freight transportation logistics giant Forward Air Corporation said a December 2020 ransomware attack had $7.5M Impact. Trucking and...
Netscout experts warn of DDoS-for-hire services abusing Plex Media servers to bounce junk traffic and amplify DDoS attacks. Security researchers from...
Cloudlist is a multi-cloud tool for getting Assets (Hostnames, IP Addresses) from Cloud Providers. This is intended to be used...
Using Go to implement CobaltStrike's Beacon This project is for learning protocol analysis and reverse engineering only, if someone's rights...
The TeamTNT hacker group has been employing a new piece of malware, dubbed Hildegard, to target Kubernetes installs. The hacking...
Security vendor Fortinet has addressed four vulnerabilities in FortiWeb web application firewalls, including a Remote Code Execution flaw. Fortinet has...
Google has addressed an actively exploited zero-day vulnerability, tracked as CVE-2021-21148, with the release of the Chrome 88.0.4324.150 version. Google released...
Netlab researchers spotted a new Android malware, dubbed Matryosh, that is infecting devices to recruit them in a distributed denial-of-service...
Satellite is an web payload hosting service which filters requests to ensure the correct target is getting a payload. This...
phpvuln is an open source OWASP penetration testing tool written in Python 3, that can speed up the the process...
The “sudo” advisory is officially presented as “Sudo Privilege Escalation Vulnerability Affecting Cisco Products: January 2021” and affects pretty much...
The provider of network security products Stormshield discloses data breach, threat actors stole information on some of its clients. Stormshield...
SonicWall has released a security patch to address the zero-day flaw actively exploited in attacks against the SMA 100 series...
Cisco addressed multiple pre-auth remote code execution (RCE) flaws in small business VPN routers that allow executing arbitrary code as...
Researchers from TIM’s Red Team Research (RTR) discovered 2 new zero-day vulnerabilities in WordPress Plugin Limit Login Attempts Reloaded Italy...