R00Kie-Kr00Kie – PoC Exploit For The CVE-2019-15126 Kr00K Vulnerability
DisclaimerThis is a PoC exploit for the CVE-2019-15126 kr00k vulnerability.This project is intended for educational purposes only and cannot be...
DisclaimerThis is a PoC exploit for the CVE-2019-15126 kr00k vulnerability.This project is intended for educational purposes only and cannot be...
One-Lin3r is simple modular and light-weight framework gives you all the one-liners that you will need while penetration testing (Windows,...
Now that nearly all Rapid7 employees—along with a huge percentage of U.S.-based knowledge workers—are sliding into a work-from-home (WFH) routine,...
Chinese security firm Qihoo 360 reported that since December 2019, a miscreants group has been hacking into DrayTek enterprise routers...
Check Point experts have identified a new family of malware in the Google Play Store. It was installed in 56...
Project iKy is a tool that collects information from an email and shows results in a nice visual interface.Visit the...
SauronEye is a search tool built to aid red teams in finding files containing specific keywords.Features:Search multiple (network) drivesSearch contents...
The spread of malware through apps being downloaded by users in the name of 'the latest information and instructions about...
Russian Security Services (RSB) has tracked down and charged an international credit card fraud ring arresting 25 accused. The carding...
Tool Information Gathering Write With Python.PreView ██╗ ██╗███████╗██████╗ ██╗ ██╗██╗██╗ ██╗ ███████╗██████╗ ██║ ██║██╔════╝██╔══██╗██║ ██╔╝██║██║ ██║ ██╔════╝██╔══██╗ ██║ █╗ ██║█████╗...
A security testing tool to facilitate GraphQL technology security auditing efforts.InQL can be used as a stand-alone script, or as...
Everyone wants to receive a free $50 Best Buy gift card and USB drive in the mail, but as the...
The Federal Bureau of Investigation as of late brought down the Russian-based online platform DEER.IO that said to have been...
Atlas VPN did a new study based on Flash Intelligence Research findings from 2017-2019. The research has revealed the costs...
Defense Minister Sergei Shoigu, speaking in the Federation Council, announced opposition attempts to penetrate Russian military facilities.The head of the...
Note #1: if using a non-direct connection (e.g. proxies in between), the -no-check-src-port flag is needed, so the server only...
Stealth post-exploitation framework for Wordpress CMSOfficial ProjectOpal Repository.What is it and why was it made?We intentionally made it for our...
In the last week, we’ve seen multiple coronavirus scams pushed by bad actors, including RAT attacks via fake health advisories,...
A malware group that goes by the name of ‘Astaroth’ has re-emerged stronger and stealthier than before. This group has...
Computer enterprise company HP (Hewlett Packard Enterprise) warns its customers about a bug that it has recently found in its...
A boutique Indian cyber security firm (a proprietorship) just went through a nightmarish experience with an MNC when it sought...
A watering hole was discovered on January 10, 2020 utilizing a full remote iOS exploit chain to deploy a feature-rich...
Tinfoil Chat (TFC) is a FOSS+FHD peer-to-peer messaging system that relies on high assurance hardware architecture to protect users from...
ConEmu-Maximus5 is a Windows console emulator with tabs, which represents multiple consoles as one customizable GUI window with various features.Initially,...