TeamTNT botnet now steals Docker API and AWS credentials
Researchers from Trend Micro discovered that the TeamTNT botnet is now able to steal Docker API logins along with AWS...
Researchers from Trend Micro discovered that the TeamTNT botnet is now able to steal Docker API logins along with AWS...
Dassault Falcon Jet has disclosed a data breach that exposed personal information belonging to current and former employees. In December...
Customized Password/Passphrase List inputting Target InfoInstallationgit clone https://github.com/edoardottt/longtongue.git cd longtongue python3 longtongue.pyUsageusage: longtongue.py Customized Password/Passphrase List inputting Target Infooptional arguments:...
hide processes and filescurrently emp3r0r uses libemp3r0r to hide its files and processes, which utilizes glibc hijacking persistencecurrently implemented methods:...
CISA revealed that threat actors behind the SolarWinds hack also used password guessing and password spraying in its attacks. Cybersecurity...
Twitter has permanently suspended the account of President Donald Trump on Friday, due to the risk of further incitement of...
Nvidia has released security updates to address high-severity vulnerabilities affecting the Nvidia GPU display driver and vGPU software. Nvidia has...
United States Department of State approved the creation of the Bureau of Cyberspace Security and Emerging Technologies (CSET). The United...
Credential Dumping Tool for SolarWinds Orion Blog post: https://malicious.link/post/2020/solarflare-release-password-dumper-for-solarwinds-orion/Credit to @asolino, @gentilkiwi, and @skelsec for helping me figuring out DPAPI....
A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces...
A misconfigured Git server is the root cause for the leak of source code of mobile apps and internal tools...
Multiple threat actors have recently started using the Ezuri memory loader as a loader to executes malware directly into the...
The US Federal Bureau of Investigation (FBI) issued a security alert warning private sector companies of Egregor ransomware attacks. The...
The Ryuk ransomware had a disruptive impact on multiple industries around the world, operators already earned more than $150 million....
Experts spotted the RokRat Trojan being used by North Korea-linked threat actors in attacks aimed at the South Korean government....
A script that can see if an email address is valid in Office365. This does not perform any login attempts,...
SARENKA is an Open Source Intelligence (OSINT) tool which helps you obtaining and understanding Attack Surface. The main goal is...
How many of you got that call at the beginning of the pandemic to make your company’s workforce 100% capable...
An expert found multiple serious vulnerabilities in Fortinet’s FortiWeb web application firewall (WAF) that could expose corporate networks to hack....
The U.S. government is going to launch the ‘Hack the Army 3.0’ bug bounty program in collaboration with the HackerOne...
The US DoJ revealed that threat actors behind the SolarWinds attack have gained access to roughly 3% of the department’s...
WhatsApp is notifying users that starting February 8, 2021, they will be obliged to share their data with Facebook, leaving...
Google released an Android security update that addressed tens of flaws, including a critical Android remote code execution vulnerability. Google...
The all-in-one Red Team browser extension for Web PentestersHackTools, is a web extension facilitating your web application penetration tests, it...