Manuka – A Modular OSINT Honeypot For Blue Teamers
Manuka is an Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue...
Manuka is an Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue...
The Treasury Department’s Office of Foreign Assets Control sanctioned a Russian government research institution linked to Triton malware targeting industrial...
As the U.S. presidential elections are approaching, the hacking and spamming attacks related to it are rising. In a similar...
Cyber attack prevention experts recorded a sharp increase in the number of cyber threats and outlined the main trends in...
Malware Mutation using Deep Reinforcement Learning and GANsThe purpose of the tool is to use artificial intelligence to mutate a...
What’s AutoGadgetFS ?AutoGadgetFS is an open source framework that allows users to assess USB devices and their associated hosts/drivers/software without...
With involvement in an 'unrestricted huge hacking campaign', which incorporates the famous Petya ransomware attacks which have focused mainly...
NoSQL scanner and injector. About NosqliI wanted a better nosql injection tool that was simple to use, fully command line...
GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I've compiled...
Posted by Kevin R on Oct 23files through a TFTP GET request Use CVE-2020-24990. If you like the site, please...
Posted by Nguyen Anh Quynh on Oct 23Greetings! We are very happy to announce version 1.0.2 of Unicorn Emulator! It...
Posted by SEC Consult Vulnerability Lab on Oct 23SEC Consult Vulnerability Lab Security Advisory < 20201023-0 > ======================================================================= title: PubliXone...
For modern Managed Service Providers (MSPs), gone are the days of disparate workflows, and that’s really for the best. Imagine...
Announcing the possible appearance of the digital ruble, the Russian Central Bank joined dozens of world Central banks that have...
In the part of their attacks on companies and government agencies in the broader Middle East region, an Iranian cyberattack...
As protection methods improve, the developers of miners have had to enhance their own creations, often turning to non-trivial solutions....
""" What is this register used for? Hmm.. I'll just rename it to veryuniquename, do a textual search, and find...
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format....
Here at Rapid7, we’ve been quite busy continuously improving, expanding functionality, and testing new features for feedback with our customers...
Posted by Vulnerability Lab on Oct 22Title: German Bundeswehr starts own Responsible Disclosure Program (VDPBw) Link:https://www.vulnerability-db.com/?q=articles/2020/10/22/german-bundeswehr-starts-own-responsible-disclosure-program-vdpbw If you like the...
Tech support browser lockers continue to be one of the most common web threats. Not only are they a problem...
The US authorities for the first time publicly responded to the proposal of Russian President Vladimir Putin to resume cooperation...
Several mobile browsers including Firefox, Chrome, and Safari were found vulnerable to an ‘address bar spoofing’ flaw which when exploited...
In the past year, Maze ransomware has become one of the most notorious malware families threatening businesses and large organizations....