Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
doj
  • News

United States Charged Six Russian Intelligence Officers with Involvement in An Unrestricted Huge Hacking Campaign

October 24, 2020

  With involvement in an 'unrestricted huge hacking campaign', which incorporates the famous Petya ransomware attacks which have focused mainly...

Read MoreRead more about United States Charged Six Russian Intelligence Officers with Involvement in An Unrestricted Huge Hacking Campaign
nosqli
  • News

NoSQLi – NoSql Injection CLI Tool

October 24, 2020

NoSQL scanner and injector. About NosqliI wanted a better nosql injection tool that was simple to use, fully command line...

Read MoreRead more about NoSQLi – NoSql Injection CLI Tool
GitDorker_1_GitDorker
  • News

GitDorker – A Tool To Scrape Secrets From GitHub Through Usage Of A Large Repository Of Dorks

October 24, 2020

GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I've compiled...

Read MoreRead more about GitDorker – A Tool To Scrape Secrets From GitHub Through Usage Of A Large Repository Of Dorks
osint
  • Vulnerabilities

CVE-2020-24990 Q-SYS <= 8.2.1 TFTP Directory Traversal

October 23, 2020

Posted by Kevin R on Oct 23files through a TFTP GET request Use CVE-2020-24990. If you like the site, please...

Read MoreRead more about CVE-2020-24990 Q-SYS <= 8.2.1 TFTP Directory Traversal
osint
  • Tools

Unicorn Emulator 1.0.2 is out!

October 23, 2020

Posted by Nguyen Anh Quynh on Oct 23Greetings! We are very happy to announce version 1.0.2 of Unicorn Emulator! It...

Read MoreRead more about Unicorn Emulator 1.0.2 is out!
osint
  • Vulnerabilities

SEC Consult SA-20201023-0 :: Multiple Vulnerabilities in PubliXone

October 23, 2020

Posted by SEC Consult Vulnerability Lab on Oct 23SEC Consult Vulnerability Lab Security Advisory < 20201023-0 > ======================================================================= title: PubliXone...

Read MoreRead more about SEC Consult SA-20201023-0 :: Multiple Vulnerabilities in PubliXone
osint
  • News

The value of cybersecurity integration for MSPs

October 23, 2020

For modern Managed Service Providers (MSPs), gone are the days of disparate workflows, and that’s really for the best. Imagine...

Read MoreRead more about The value of cybersecurity integration for MSPs
digitization-3614384_1280
  • News

Expert opinion: how the digital currency of the Bank of Russia will change the future of the country

October 23, 2020

Announcing the possible appearance of the digital ruble, the Russian Central Bank joined dozens of world Central banks that have...

Read MoreRead more about Expert opinion: how the digital currency of the Bank of Russia will change the future of the country
hack-iran
  • News

Iranian Hacker Group Using New Tools to Target Government Agencies of Broader Middle East Region

October 23, 2020

 In the part of their attacks on companies and government agencies in the broader Middle East region, an Iranian cyberattack...

Read MoreRead more about Iranian Hacker Group Using New Tools to Target Government Agencies of Broader Middle East Region
sl_abstract_xmrig-990x400-1
  • News

On the trail of the XMRig miner

October 23, 2020

As protection methods improve, the developers of miners have had to enhance their own creations, often turning to non-trivial solutions....

Read MoreRead more about On the trail of the XMRig miner
oregami_1_oregami
  • News

Oregami – IDA Plugins And Scripts For Analyzing Register Usage Frame

October 23, 2020

""" What is this register used for? Hmm.. I'll just rename it to veryuniquename, do a textual search, and find...

Read MoreRead more about Oregami – IDA Plugins And Scripts For Analyzing Register Usage Frame
ntlm
  • News

NTLMRawUnHide – A Python3 Script Designed To Parse Network Packet Capture Files And Extract NTLMv2 Hashes In A Crackable Format

October 23, 2020

NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format....

Read MoreRead more about NTLMRawUnHide – A Python3 Script Designed To Parse Network Packet Capture Files And Extract NTLMv2 Hashes In A Crackable Format
Computer
  • News

What’s New in InsightAppSec and tCell: Q3 2020 in Review

October 23, 2020

Here at Rapid7, we’ve been quite busy continuously improving, expanding functionality, and testing new features for feedback with our customers...

Read MoreRead more about What’s New in InsightAppSec and tCell: Q3 2020 in Review
osint
  • Vulnerabilities

VL 2020-10-22 – German Bundeswehr starts own Responsible Disclosure Program (VDPBw)

October 22, 2020

Posted by Vulnerability Lab on Oct 22Title: German Bundeswehr starts own Responsible Disclosure Program (VDPBw) Link:https://www.vulnerability-db.com/?q=articles/2020/10/22/german-bundeswehr-starts-own-responsible-disclosure-program-vdpbw If you like the...

Read MoreRead more about VL 2020-10-22 – German Bundeswehr starts own Responsible Disclosure Program (VDPBw)
flow
  • News

XSS to TSS: tech support scam campaign abuses cross-site scripting vulnerability

October 22, 2020

Tech support browser lockers continue to be one of the most common web threats. Not only are they a problem...

Read MoreRead more about XSS to TSS: tech support scam campaign abuses cross-site scripting vulnerability
putin-889784_1280
  • News

United States rejected Putin’s offer to cooperate on cybersecurity

October 22, 2020

The US authorities for the first time publicly responded to the proposal of Russian President Vladimir Putin to resume cooperation...

Read MoreRead more about United States rejected Putin’s offer to cooperate on cybersecurity
website-454460_960_720
  • News

Mobile Versions of Several Browsers Found Vulnerable to Address Bar Spoofing Flaws

October 22, 2020

 Several mobile browsers including Firefox, Chrome, and Safari were found vulnerable to an ‘address bar spoofing’ flaw which when exploited...

Read MoreRead more about Mobile Versions of Several Browsers Found Vulnerable to Address Bar Spoofing Flaws
abstract-digital-blue-lock-990x400-1
  • News

Life of Maze ransomware

October 22, 2020

In the past year, Maze ransomware has become one of the most notorious malware families threatening businesses and large organizations....

Read MoreRead more about Life of Maze ransomware
MalwareSourceCode_1_logo
  • News

MalwareSourceCode – Collection Of Malware Source Code For A Variety Of Platforms In An Array Of Different Programming Languages

October 22, 2020

Malware Source Code Collection!!! DISCLAIMER !!! We do not take any responsibility for any damage done by the code in...

Read MoreRead more about MalwareSourceCode – Collection Of Malware Source Code For A Variety Of Platforms In An Array Of Different Programming Languages
1_shared_audit_demo
  • News

Pwndoc – Pentest Report Generator

October 22, 2020

PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx...

Read MoreRead more about Pwndoc – Pentest Report Generator
Screen-Shot-2020-10-21-at-10.59.03-AM
  • News

This One Time on a Pen Test: Thanks for Sharing Your Wi-Fi

October 22, 2020

Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...

Read MoreRead more about This One Time on a Pen Test: Thanks for Sharing Your Wi-Fi
osint
  • Vulnerabilities

[RT-SA-2020-005] Arbitrary File Disclosure and Server-Side Request Forgery in BigBlueButton

October 21, 2020

Posted by RedTeam Pentesting GmbH on Oct 21Advisory: Arbitrary File Disclosure and Server-Side Request Forgery in BigBlueButton RedTeam Pentesting discovered...

Read MoreRead more about [RT-SA-2020-005] Arbitrary File Disclosure and Server-Side Request Forgery in BigBlueButton
10399081block
  • News

Brute force attacks increase due to more open RDP ports

October 21, 2020

While leaving your back door open while you are working from home may be something you do without giving it...

Read MoreRead more about Brute force attacks increase due to more open RDP ports
hacker-2883635_1280
  • News

The Russian Embassy denies the US charge of six Russians in hacking

October 21, 2020

The Russian Embassy in Washington denies US accusations against Russian citizens of hacking and destabilizing activities around the worldRussia has...

Read MoreRead more about The Russian Embassy denies the US charge of six Russians in hacking

Posts pagination

Previous 1 … 3,981 3,982 3,983 3,984 3,985 3,986 3,987 … 4,083 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-4875

May 19, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4874

May 19, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4873

May 19, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4872

May 19, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-4880

May 19, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel