MalSCCM – Tool To Abuse Local Or Remote SCCM Servers To Deploy Malicious Applications
This tool allows you to abuse local or remote SCCM servers to deploy malicious applications to hosts they manage. To...
This tool allows you to abuse local or remote SCCM servers to deploy malicious applications to hosts they manage. To...
Cyber Spetsnaz is targeting government resources and critical infrastructure in Lithuania after the ban of Russian railway goods Cyber Spetsnaz...
Researchers from Malwarebytes warns that the Magecart skimming campaign is active, but the attacks are more covert. Magecart threat actors...
CreditsAuthor: M3n0sD0n4ldTwitter: @David_UtonDescription:GooFuzz is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information...
Threat actors are using the Rig Exploit Kit to spread the Dridex banking trojan instead of the Raccoon Stealer malware....
US Flagstar Bank disclosed a data breach that exposed files containing the personal information of 1.5 million individuals. US-based Flagstar...
Naabu is a port scanning tool written in Go that allows you to enumerate valid ports for hosts in a...
Researchers linked a new APT group, tracked as ToddyCat, to a series of attacks targeting entities in Europe and Asia...
Finding all things on-prem Microsoft for password spraying and enumeration. The tool will used a list of common subdomains associated...
Experts discovered a new kind of Windows NTLM relay attack dubbed DFSCoerce that allows taking control over a Windows domain. Researchers warn...
Experts identified a spike in phishing content delivered via Azure Front Door (AFD), a cloud CDN service provided by Microsoft....
The Attorney General has issued an arrest warrant for a hacker who targeted a NATO think tank in Germany for...
Often a Red Team engagement is more than just achieving Domain Admin. Some clients will want to see if specific...
Google Project Zero experts disclosed details of a 5-Year-Old Apple Safari flaw actively exploited in the wild. Researchers from the...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
This repository is a Dockerized php application containing some XSS vulnerability challenges. The ideas behind challenges are: Javascript validation bypass...
Cisco announced that it will not release updates to fix the CVE-2022-20825 flaw in end-of-life Small Business RV routers. Cisco...
The developers behind the BRATA Android malware have implemented additional features to avoid detection. The operators behind the BRATA Android malware have implemented...
Unless you have been living under an infosec rock the past couple of weeks, you probably heard about the Follina...
A critical vulnerability in Ninja Forms plugin potentially impacted more than one million WordPress websites In middle June, the Wordfence...
The Vulnerable API (Based on OpenAPI 3)Â VAmPI is a vulnerable API made with Flask and it includes vulnerabilities from...
Cervantes is an opensource collaborative platform for pentesters or red teams who want to save time to manage their projects,...
Experts warn of a new ech0raix ransomware campaign targeting QNAP Network Attached Storage (NAS) devices. Bleeping Computer and MalwareHunterTeam researchers,...
The idea of this project is to identify beacons which are unpacked at runtime or running in the context of...