Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
hack-iran
  • News

Iranian Hacker Group Using New Tools to Target Government Agencies of Broader Middle East Region

October 23, 2020

 In the part of their attacks on companies and government agencies in the broader Middle East region, an Iranian cyberattack...

Read MoreRead more about Iranian Hacker Group Using New Tools to Target Government Agencies of Broader Middle East Region
sl_abstract_xmrig-990x400-1
  • News

On the trail of the XMRig miner

October 23, 2020

As protection methods improve, the developers of miners have had to enhance their own creations, often turning to non-trivial solutions....

Read MoreRead more about On the trail of the XMRig miner
oregami_1_oregami
  • News

Oregami – IDA Plugins And Scripts For Analyzing Register Usage Frame

October 23, 2020

""" What is this register used for? Hmm.. I'll just rename it to veryuniquename, do a textual search, and find...

Read MoreRead more about Oregami – IDA Plugins And Scripts For Analyzing Register Usage Frame
ntlm
  • News

NTLMRawUnHide – A Python3 Script Designed To Parse Network Packet Capture Files And Extract NTLMv2 Hashes In A Crackable Format

October 23, 2020

NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format....

Read MoreRead more about NTLMRawUnHide – A Python3 Script Designed To Parse Network Packet Capture Files And Extract NTLMv2 Hashes In A Crackable Format
Computer
  • News

What’s New in InsightAppSec and tCell: Q3 2020 in Review

October 23, 2020

Here at Rapid7, we’ve been quite busy continuously improving, expanding functionality, and testing new features for feedback with our customers...

Read MoreRead more about What’s New in InsightAppSec and tCell: Q3 2020 in Review
osint
  • Vulnerabilities

VL 2020-10-22 – German Bundeswehr starts own Responsible Disclosure Program (VDPBw)

October 22, 2020

Posted by Vulnerability Lab on Oct 22Title: German Bundeswehr starts own Responsible Disclosure Program (VDPBw) Link:https://www.vulnerability-db.com/?q=articles/2020/10/22/german-bundeswehr-starts-own-responsible-disclosure-program-vdpbw If you like the...

Read MoreRead more about VL 2020-10-22 – German Bundeswehr starts own Responsible Disclosure Program (VDPBw)
flow
  • News

XSS to TSS: tech support scam campaign abuses cross-site scripting vulnerability

October 22, 2020

Tech support browser lockers continue to be one of the most common web threats. Not only are they a problem...

Read MoreRead more about XSS to TSS: tech support scam campaign abuses cross-site scripting vulnerability
putin-889784_1280
  • News

United States rejected Putin’s offer to cooperate on cybersecurity

October 22, 2020

The US authorities for the first time publicly responded to the proposal of Russian President Vladimir Putin to resume cooperation...

Read MoreRead more about United States rejected Putin’s offer to cooperate on cybersecurity
website-454460_960_720
  • News

Mobile Versions of Several Browsers Found Vulnerable to Address Bar Spoofing Flaws

October 22, 2020

 Several mobile browsers including Firefox, Chrome, and Safari were found vulnerable to an ‘address bar spoofing’ flaw which when exploited...

Read MoreRead more about Mobile Versions of Several Browsers Found Vulnerable to Address Bar Spoofing Flaws
abstract-digital-blue-lock-990x400-1
  • News

Life of Maze ransomware

October 22, 2020

In the past year, Maze ransomware has become one of the most notorious malware families threatening businesses and large organizations....

Read MoreRead more about Life of Maze ransomware
MalwareSourceCode_1_logo
  • News

MalwareSourceCode – Collection Of Malware Source Code For A Variety Of Platforms In An Array Of Different Programming Languages

October 22, 2020

Malware Source Code Collection!!! DISCLAIMER !!! We do not take any responsibility for any damage done by the code in...

Read MoreRead more about MalwareSourceCode – Collection Of Malware Source Code For A Variety Of Platforms In An Array Of Different Programming Languages
1_shared_audit_demo
  • News

Pwndoc – Pentest Report Generator

October 22, 2020

PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx...

Read MoreRead more about Pwndoc – Pentest Report Generator
Screen-Shot-2020-10-21-at-10.59.03-AM
  • News

This One Time on a Pen Test: Thanks for Sharing Your Wi-Fi

October 22, 2020

Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...

Read MoreRead more about This One Time on a Pen Test: Thanks for Sharing Your Wi-Fi
osint
  • Vulnerabilities

[RT-SA-2020-005] Arbitrary File Disclosure and Server-Side Request Forgery in BigBlueButton

October 21, 2020

Posted by RedTeam Pentesting GmbH on Oct 21Advisory: Arbitrary File Disclosure and Server-Side Request Forgery in BigBlueButton RedTeam Pentesting discovered...

Read MoreRead more about [RT-SA-2020-005] Arbitrary File Disclosure and Server-Side Request Forgery in BigBlueButton
10399081block
  • News

Brute force attacks increase due to more open RDP ports

October 21, 2020

While leaving your back door open while you are working from home may be something you do without giving it...

Read MoreRead more about Brute force attacks increase due to more open RDP ports
hacker-2883635_1280
  • News

The Russian Embassy denies the US charge of six Russians in hacking

October 21, 2020

The Russian Embassy in Washington denies US accusations against Russian citizens of hacking and destabilizing activities around the worldRussia has...

Read MoreRead more about The Russian Embassy denies the US charge of six Russians in hacking
code-4333398_1280
  • News

Russian military companies were reportedly attacked by hackers from North Korea

October 21, 2020

North Korean hacker group Kimsuky has reportedly conducted several attacks on the Russian military-industrial complex in order to obtain military...

Read MoreRead more about Russian military companies were reportedly attacked by hackers from North Korea
114994565_gettyimages-1207205757
  • News

UK National Cyber Security Centre Reveals Russia’s Plan to Disrupt Tokyo Olympics

October 21, 2020

 The UK National Cyber Security Centre recently revealed that in an attempt to completely disrupt the 'world's premier sporting event'...

Read MoreRead more about UK National Cyber Security Centre Reveals Russia’s Plan to Disrupt Tokyo Olympics
zap-hud_6_ZAP-HUD-Welcome-banner
  • News

Zap-Hud – The OWASP ZAP Heads Up Display (HUD)

October 21, 2020

The HUD is new interface that provides the functionality of ZAP directly in the browser. Learn more: Blog: Hacking with...

Read MoreRead more about Zap-Hud – The OWASP ZAP Heads Up Display (HUD)
patch-checker_1_getting_info
  • News

PatchChecker – Web-based Check For Windows Privesc Vulnerabilities

October 21, 2020

This is the code base for the service running on: https://patchchecker.com. In short, PatchChecker is a web application (running on...

Read MoreRead more about PatchChecker – Web-based Check For Windows Privesc Vulnerabilities
October
  • News

Vulntober: Multiple Mobile Browser Address Bar Spoofing Vulnerabilities

October 21, 2020

Today, we're announcing a coordinated vulnerability disclosure publication with our longtime mobile hacker friend, Rafay Baloch. If you'd like to...

Read MoreRead more about Vulntober: Multiple Mobile Browser Address Bar Spoofing Vulnerabilities
osint
  • Vulnerabilities

Re: Google’s Android: remote install backdoor in Google Play Services

October 20, 2020

Posted by Pedro Cunha on Oct 20I don't see how this is an "on-purpose backdoor". As far as I know,...

Read MoreRead more about Re: Google’s Android: remote install backdoor in Google Play Services
osint
  • Vulnerabilities

Re: Google’s Android: remote install backdoor in Google Play Services

October 20, 2020

Posted by Michael Lazin on Oct 20I do see the point and even though it is not a deliberate back...

Read MoreRead more about Re: Google’s Android: remote install backdoor in Google Play Services
osint
  • Vulnerabilities

LISTSERV Maestro Remote Code Execution Vulnerability

October 20, 2020

Posted by Ryan Wincey on Oct 20Document Title: =============== LISTSERV Maestro Remote Code Execution Vulnerability References (Source): ====================https://www.securifera.com/advisories/sec-2020-0001/https://www.lsoft.com/products/maestro.asp Release Date:...

Read MoreRead more about LISTSERV Maestro Remote Code Execution Vulnerability

Posts pagination

Previous 1 … 3,963 3,964 3,965 3,966 3,967 3,968 3,969 … 4,064 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[LOCKBIT3] – Ransomware Victim: hennessyfunds[.]com

May 9, 2025
image
  • Data Breach
  • Ransomware

[RHYSIDA] – Ransomware Victim: Mountain View Mushrooms

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025
184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]242[.]200[.]223:80

May 9, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel