LEAF – Linux Evidence Acquisition Framework
Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from Linux EXT4 systems, accepting user input to customize the functionality...
Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from Linux EXT4 systems, accepting user input to customize the functionality...
Security researchers devised a technique, dubbed GhostTouch, to remotely control touchscreens using electromagnetic signals. A team of researchers from Zhejiang...
The FBI warns organizations in the higher education sector of credentials sold on cybercrime forums that can allow threat actors...
The goal of this repository is to provide a simple, harmless way to check your AV's protection on ransomware. This...
A new version of the ERMAC Android banking trojan is able to target an increased number of apps. The ERMAC...
Security researchers released PoC exploit code for the critical authentication bypass vulnerability CVE-2022-22972 affecting multiple VMware products. Horizon3 security researchers...
pocsploit is a lightweight, flexible and novel open source poc verification framework Pain points of the POC framework in the...
An investigation of the infamous “Is That You?” video scam led Cybernews researchers into exposing threat actors who are poisoning...
Zyxel addressed multiple vulnerabilities impacting many of its products, including APs, AP controllers, and firewalls. Zyxel has released security updates...
Researchers warn of a new malvertising campaign spreading the ChromeLoader malware that hijacks the victims’ browsers. Researchers from Red Canary...
FindFunc is an IDA Pro plugin to find code functions that contain a certain assembly or byte pattern, reference a...
The maintainers of the Tails project (The Amnesic Incognito Live System) warn users that the Tor Browser bundled with the...
Italy announced its National Cybersecurity Strategy for 2022/26, a crucial document to address cyber threats and increase the resilience of...
An unknown APT group is targeting Russian government entities since the beginning of the Russian invasion of Ukraine. Researchers from...
A tool that helps you can easy using frida. It support script for trace classes, functions, and modify the return...
The Nigeria Police Force has arrested the suspected leader of the SilverTerrier cybercrime group as a result of an international...
A machine learning malware analysis framework for Android apps. DroidDetective is a Python tool for analysing Android applications (APKs) for...
Security flaws in Zoom can be exploited to compromise another user over chat by sending specially crafted messages. A set...
US Critical Infrastructure Security Agency (CISA) adds 41 new vulnerabilities to its Known Exploited Vulnerabilities Catalog. The Cybersecurity & Infrastructure...
anonymously reverse shell over onion network using If you are having any operating system compatiblity issue, let me know. I...
Reposaur is the open source compliance tool for development platforms. Audit, verify and report on your data and configurations easily...
Trend Micro addressed a DLL hijacking issue in Trend Micro Security actively exploited by a China-linked threat group to deploy...
Threat actors behind web skimming campaigns are using malicious JavaScript to mimic Google Analytics and Meta Pixel scripts to avoid...
Interpol Secretary warns that nation-state malware will become available on the cybercrime underground in a couple of years. Interpol Secretary...