HashCheck – Tool To Assist In The Search For Leaked Passwords
This project aims to assist in the search for leaked passwords while maintaining a high level of privacy using the...
This project aims to assist in the search for leaked passwords while maintaining a high level of privacy using the...
Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods. I have included...
DirtyMoe is a Windows botnet that is rapidly growing, it passed from 10,000 infected systems in 2020 to more than...
The Tor Project released Tor Browser 10.0.18 that addresses a flaw that allows sites to track users by fingerprinting the...
Boffins developed a tool dubbed DroidMorph that provides morphing of Android applications (APKs) and allows to create Android apps (malware/benign)...
The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more...
Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the importance of...
Remember when we told you to patch your VPNs already? I hate to say “I told you so”, but I...
Earlier this month, Schneider Electric, a global supplier of energy and automation digital solutions published a security advisory for its...
After two months of break, a Middle Eastern advanced persistent-threat (APT) organization has resurfaced and is targeting government institutions in...
Squalr Official Website Join us on our Discord Channel Squalr is performant Memory Editing software that allows users to create...
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps. Using raw RDP...
The US National Security Agency (NSA) released guidance for securing Unified Communications/Voice and Video over IP Systems (VVoIP). NSA last...
The British intelligence agency MI5 seized Boris Johnson ‘s phone over concerns related to the availability of his number online...
Jaroslaw Kaczynski, the leader of the Poland Law and Justice party, blames Russia for the recent cyberattack targeting top Polish politicians. Jaroslaw...
Last week on Malwarebytes Labs: How to delete your Instagram account.Working from home? You’re probably being spied on.Another one bites...
Ransomware attacks are on a different scale this year, with major attacks not just dismantling the business and management of...
Volkswagen announced that a massive data breach exposed the personal information of over 3.3 million customers after one of its...
In the recent analysis, experts discovered that the digital credit card skimming ecosystem evolves as experts identify new players, tooling,...
Experts analyzed how often children encounter cyber incidents in the online space. It turned out that every fifth child has...
Recorded Future, a US security firm, revealed a cyber espionage campaign linked to a suspected Chinese state-sponsored threat activity group,...
The Russian government wants to create a single video surveillance system that will unite smart cameras in Russian cities. The...
This project is a PoC code to use Pass-the-Hash for authentication on a local Named Pipe user Impersonation. There also...
A tool for simplifying the process of researching file hashes, IP addresses, and other indicators of compromise (IOCs). FeaturesLook up...