Gowitness – A Golang, Web Screenshot Utility Using Chrome Headless
gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using...
gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using...
On Dec. 17, 2019, a directory traversal vulnerability was announced in the Citrix Application Discovery Controller and Citrix Gateway, which...
Since resuming operations after a holiday hiatus, the malicious actors behind the Emotet banking trojan network have reportedly targeted at...
How do your favorite brands know to use your first name in the subject line of their emails? Why do...
For years, an annual, must-pass federal spending bill has served as a vehicle for minor or contentious provisions that might...
Termination of technical support for Windows 7 and Windows Server 2008 operating systems (OS) can become a serious problem for...
Russian hackers in November 2019 attacked the Ukrainian energy company Burisma in order to gain potentially compromising information about former...
According to a survey of 2,718 executives from across 100 countries, cyber security incidents ranked as the biggest risk to...
A group of cyber security analyst, Intrusion Truth have found their fourth Chinese state-sponsored hacking operation APT 40."APT groups in...
A crypto-mining exploit attack, has as of late been discovered in Windows 7 , the ex-operating system which ceased to...
Python library to remotely extract credentials. This blog post explains how it works.You can check the wikiThis library uses impacket...
LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and...
What is the CryptoAPI Spoofing Vulnerability? Who is impacted?A flaw (CVE-2020-0601) has recently been found in the way the Microsoft...
Nowadays, it’s easier than ever to create an app that allows customers to interact with your brand. If your app...
While skimming code is normally stored on infrastructure controlled by the attackers, researchers have observed threat actors creating thousands of...
keep their CMS and its plugins up-to-date, as well as using secure authentication methods,” Segura concluded. “Over the past year,...
“Dark Hotel” in ambito cyber-espionage (rif. Early Warning N040518), oltre che in recenti campagne di propagazione di varianti malware Original...
results of her work were published today in the long-form article "Under the Hoodie: Why Money, Power, and Ego Drive Hackers...
to security researchers at Malwarebytes, a large number of legitimate websites have been hacked to load short URLs unknowingly, generated...
What is a shell backdoor ?A backdoor shell is a malicious piece of code (e.g. PHP, Python, Ruby) that can...
hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It...
Metasploit’s community CTF is back by popular demand. Starting January 30, put your skills to the test for a chance...
2020 starts off with a relatively heavy list of patches for Microsoft users. January is typically a light month for...
If you’re ever at the receiving end of a rootkit attack, then you’ll understand why they are considered one of...