Numerous fraudulent sites disguised as well-known brands have appeared on the Runet
In autumn, experts recorded mass registration of domain names with the names of well-known brands in the .RU zoneSpecialists at...
In autumn, experts recorded mass registration of domain names with the names of well-known brands in the .RU zoneSpecialists at...
A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Features Scan the contents...
TASER (Testing And SEecurity Resource) is a Python resource library used to simplify the process of creating offensive security tooling,...
In this third installment of our series around 2021 security planning, we’re focused on SOC automation. In part one, we...
Posted by Julien Ahrens (RCE Security) on Oct 27RCE Security Advisoryhttps://www.rcesecurity.com 1. ADVISORY INFORMATION ======================= Product: God Kings Vendor URL:...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Google has recently released Chrome version 86.0.4240.111 to patch several holes. One is for a zero-day flaw – that means...
jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and...
An extensible application for penetration testers and software developers to decode/encode data into various formats.SetupDecoder++ can be either installed by...
When you start out with one of our vulnerability management solutions, Nexpose or InsightVM, one of the first things you...
The US Senate Judiciary Committee has asked the CEO of Twitter and Facebook to evaluate their role in “platforms’...
Cybercriminals are using a newly created Artificial Intelligence bot to generate and share deepfake nude images of women on the...
Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence...
Manuka is an Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue...
The Treasury Department’s Office of Foreign Assets Control sanctioned a Russian government research institution linked to Triton malware targeting industrial...
As the U.S. presidential elections are approaching, the hacking and spamming attacks related to it are rising. In a similar...
Cyber attack prevention experts recorded a sharp increase in the number of cyber threats and outlined the main trends in...
Malware Mutation using Deep Reinforcement Learning and GANsThe purpose of the tool is to use artificial intelligence to mutate a...
What’s AutoGadgetFS ?AutoGadgetFS is an open source framework that allows users to assess USB devices and their associated hosts/drivers/software without...
With involvement in an 'unrestricted huge hacking campaign', which incorporates the famous Petya ransomware attacks which have focused mainly...
NoSQL scanner and injector. About NosqliI wanted a better nosql injection tool that was simple to use, fully command line...
GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I've compiled...
Posted by Kevin R on Oct 23files through a TFTP GET request Use CVE-2020-24990. If you like the site, please...
Posted by Nguyen Anh Quynh on Oct 23Greetings! We are very happy to announce version 1.0.2 of Unicorn Emulator! It...