Huan – Encrypted PE Loader Generator
Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It...
Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It...
gargantuan hashcat rulesets generated from compromised passwords Project maintenance warning: This project is deemed completed. No pull requests or changes...
Crooks behind the Phorpiex botnet have shut down their operations and put the source code for sale on the dark...
Atlassian released patches to fix a critical flaw, tracked as CVE-2021-26084, affecting the Confluence enterprise collaboration product. Atlassian released security patches...
Researchers from Nozomi Networks discovered a critical vulnerability that can be exploited to hack a video surveillance product made by...
Microsoft has fixed a critical flaw in Cosmos DB that allowed any Azure user to remotely take over other users’...
The Microsoft 365 Defender Threat Intelligence Team posted an article stating that they have been tracking a widespread credential phishing...
Labor Day weekend is just around the corner and, believe it or not, cybercriminals are likely just as excited as you are! ...
DeviceLock, a Russian manufacturer of anti-data leakage systems, reported that the number of complaints about attempts to hack accounts on...
Researchers at Trend Micro, have identified and flagged nearly 14 million Linux-based systems that are directly exposed to the internet,...
According to an apparent email leak, the United Launch Alliance, a major SpaceX competitor, was planning to promote conspiracy stories...
The personal data and clinical information of roughly 73,500 patients of a private eye clinic were hit by a ransomware...
The Chinese developers of famous Android gaming applications exposed user information via an unprotected server. As per the report shared...
A CTF web challenge about making screenshots. It is inspired by a bug found in real life. The challenge was...
Tags: API Documentation, Access, Active Directory, Analysis, Binary, LDAP, Linux, Max, Memory, Parameter, Reverse, Takeover, Windows, pwned, Adalancheadalanche - Active...
The Federal Bureau of Investigation (FBI) published a flash alert related to the operations of the Hive ransomware gang. The...
Ragnarok ransomware operators are ceasing their operations and released the master key that can allow their victims to decrypt files...
Researchers disclosed five vulnerabilities in B. Braun ‘s Infusomat Space Large Volume Pump and SpaceStation that could be remotely hacked....
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released five malware analysis reports (MARs) related to samples found on compromised...
Cisco addressed a critical security vulnerability in the Application Policy Infrastructure Controller (APIC) interface used in its Nexus 9000 Series...
Software firm Kaseya addressed Kaseya Unitrends zero-day vulnerabilities that were reported by security researchers at the Dutch Institute for Vulnerability...
In August 2021, 38 million records from Indian e-commerce company IndiaMART were found being traded on a popular hacking forum....
Researchers from Citizen Lab, an academic research and development lab based in the University of Toronto in Canada, has recently...
In the wake of several high-profile ransomware attacks against critical infrastructure and major organizations in the last few months, President...