Xeca – PowerShell Payload Generator
xeca is a project that creates encrypted PowerShell payloads for offensive purposes.Creating position independent shellcode from DLL files is also...
xeca is a project that creates encrypted PowerShell payloads for offensive purposes.Creating position independent shellcode from DLL files is also...
Zoom adoption has skyrocketed with spikes in remote working, but web application security needs to be a top priority to...
Introduction Reverse engineering of Android applications is usually considered as somewhat effortless because of the possibility of retrieving the Java...
The Council of the European Union imposed its first-ever sanction against persons or entities engaged with different cyber-attacks focusing on...
cnitch (snitch or container snitch) is a simple framework and command line tool for monitoring Docker containers to identify any...
Mística is a tool that allows to embed data into application layer protocol fields, with the goal of establishing a...
Graham Clark, a resident of Tampa Florida has been arrested under charges of being involved in July’s Twitter hack that...
DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that...
EternalBlue suite remade in C which includes: MS17-010 Exploit, EternalBlue/MS17-010 vulnerability detector, DoublePulsar detector and DoublePulsar UploadDLL & Shellcode ms17_vuln_status.cpp...
US police authorities in a press conference on Friday said they had arrested the main accused and two other suspects...
Petrarch once said, "Sameness is the mother of disgust, variety the cure". And we as a society believe quite strongly...
CWFF is a tool that creates a special High quality fuzzing/content discovery wordlist for you at the highest speed possible...
Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report.Example...
For the last few weeks, there’s been a solid stream of fake PayPal emails in circulation, twisting FOMO (fear of...
The social networks and US military have imposed high regulations to control Islamist propaganda on social media and have been...
The use of crypto-ransomware in targeted attacks has become an ordinary occurrence lately: new incidents are being reported every month,...
Kubei is a vulnerabilities scanning tool that allows users to get an accurate and immediate risk assessment of their kubernetes...
A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. dazzleUP...
Update as of 10:00 A.M. PST, July 30, 2020: Our continued analysis of the malware sample showed adjustments to the...
They say any publicity is good publicity. But perhaps this isn’t true for CloudEye, an Italian firm that claims to...
The recently conducted online Michigan bar exam was briefly taken down as it was hit by a rather "sophisticated" cyberattack. The...
uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files...
The Rapid7 Metasploit team is taking a page from DEF CON’s “SAFE MODE” operations this year, hosting our annual Open...
In part one of this two-part series on the cloud and cloud security for security professionals, we dove into everything...