Russia-linked Turla APT targets Austria, Estonia, and NATO platform
Russia-linked APT group Turla was observed targeting the Austrian Economic Chamber, a NATO eLearning platform, and the Baltic Defense College....
Russia-linked APT group Turla was observed targeting the Austrian Economic Chamber, a NATO eLearning platform, and the Baltic Defense College....
pip3 install frelatageCurrent release : Frelatage is a coverage-based Python fuzzing library which can be used to fuzz python code....
Researchers warn that the Fronton botnet was used by Russia-linked threat actors for coordinated disinformation campaigns. Fronton is a distributed...
A security researcher announced the discovery of an unpatched flaw in PayPal that could allow attackers to steal money from...
FindWall is Python script that allows to understand if your network provider is limiting your access to the Internet by...
Google’s Threat Analysis Group (TAG) uncovered campaigns targeting Android users with five zero-day vulnerabilities. Google’s Threat Analysis Group (TAG) researchers...
Researchers uncovered a malware campaign targeting the infoSec community with fake Proof Of Concept to deliver a Cobalt Strike beacon....
Commonly used tools for Red Teaming Engagements, Physical Security Assessments, and Tactical Covert Entry. In this list I decided to...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
North Korea-linked Lazarus APT is exploiting the Log4J remote code execution (RCE) in attacks aimed at VMware Horizon servers. North...
OSINT tool to scrape names and usernames from large friend lists on Facebook, without being rate limited. Getting started: Install...
The Pwn2Own Vancouver 2022 hacking contest ended, Trend Micro and ZDI awarded a total of $1,155,000 for successful attempts! During...
DISCLAIMER This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in...
The media company Nikkei has disclosed a ransomware attack and revealed that the incident might have impacted customer data. The...
Security researchers from ESET reported that the Russia-linked APT group Sandworm continues to target Ukraine. Security experts from ESET reported...
Tetanus is a Windows and Linux C2 agent written in rust. Installation To install Tetanus, you will need Mythic set...
Cisco addressed a medium-severity vulnerability affecting IOS XR Software, the company warns that the flaw is actively exploited in the...
Taiwanese vendor QNAP warned customers of a new wave of DeadBolt ransomware attacks and urges them to install the latest...
Xepor (pronounced /ˈzɛfə/, zephyr), a web routing framework for reverse engineers and security researchers. It provides a Flask-like API for...
During the second day of the Pwn2Own Vancouver 2022 hacking competition, contestants demonstrated a working exploit for Microsoft Windows 11....
Microsoft researchers have observed a spike in the activity of the Linux bot XorDdos over the last six months. XORDDoS,...
Octopus is an open source, pre-operation C2 server based on python which can control an Octopus powershell agent through HTTP/S....
The Conti ransomware gang shut down its operation, and some of its administrators announced a branding of the gang. Advanced...
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike. Installation chmod u+x...