Netwalker Ransomware hit Argentina’s official immigration agency
Argentina’s official immigration agency, Dirección Nacional de Migraciones, is the last victim of the Netwalker ransomware operators. Argentina’s official immigration...
Argentina’s official immigration agency, Dirección Nacional de Migraciones, is the last victim of the Netwalker ransomware operators. Argentina’s official immigration...
Visa issued a warning regarding a new credit card JavaScript skimmer, tracked as Baka, that implements new features to evade...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
WhatsApp addressed six previously undisclosed flaws in its app and disclosed them on a new dedicated security advisory site. WhatsApp announced...
The US Federal Communications Commission (FCC) estimates the cost of a full replacement of all Huawei and ZTE hardware on...
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and...
Script that allows the easy creation of OpenVPN endpoints in any AWS region. To create a VPN endpoint is done...
Create a VPS on Google Cloud Platform or Digital Ocean easily with the docker for pentest included to launch the...
hardcodes is a utility for searching strings hardcoded by developers in programs. It uses a modular tokenizer that can handle...
wordlist_generator generates wordlists with unique words with techniques mentioned in tomnomnom's report "Who, What, Where, When". It takes URLs from...
There are better ways than managing vulnerabilities with spreadsheets, especially when you are working with several tools. We know it’s...
h4rpy is an automated WPA/WPA2 PSK attack tool, wrapper of aircrack-ng framework.h4rpy provides clean interface for automated cracking of WPA/WPA2...
SNIcat is a proof of concept tool that performs data exfiltration, utilizing a covert channel method via. Server Name Indication,...
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.SetupThis tool is compactible...
Bug Bounty Recon (bbrecon) is a free Recon-as-a-Service for bug bounty hunters and security researchers. The API aims to provide...
SpaceSiren is a honey token manager and alert system for AWS. With this fully serverless application, you can create and...
LOLBITS is a C2 framework that uses Microsoft's Background Intelligent Transfer Service (BITS) to establish the communication channel between the...
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...
What is “Kill Chain”?From Wikipedia: The term kill chain was originally used as a military concept related to the structure...
A security framework for enterprises and Red Team personnel, supports CobaltStrike's penetration testing of other platforms (Linux / MacOS /...
This blog post is part two of a two-part series. For more insights from Gisela and Carlota, check out part...
Did you ever wonder how you can move laterally through internal networks? or interact with remote machines without alerting EDRs?Let's...
Mihari is a helper to run queries & manage results continuously. Mihari can be used for C2, landing page and...
“I think the best way to tell a story is by starting at the end, briefly, then going back to...