Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • Vulnerabilities

Two vulnerabilities found in MikroTik’s RouterOS

August 18, 2020

Posted by Q C on Aug 14Advisory: two vulnerabilities found in MikroTik's RouterOS Details ======= Product: MikroTik's RouterOS Vendor URL:...

Read MoreRead more about <div>Two vulnerabilities found in MikroTik’s RouterOS</div>
osint
  • Vulnerabilities

Avian JVM vm::arrayCopy() silent return on negative length

August 18, 2020

Posted by Pietro Oliva via Fulldisclosure on Aug 11Vulnerability title: Avian JVM vm::arrayCopy() silent return on negative length Author: Pietro...

Read MoreRead more about Avian JVM vm::arrayCopy() silent return on negative length
osint
  • Vulnerabilities

Avian JVM vm::arrayCopy() Multiple Integer Overflows

August 18, 2020

Posted by Pietro Oliva via Fulldisclosure on Aug 11Vulnerability title: Avian JVM vm::arrayCopy() Multiple Integer Overflows Author: Pietro Oliva CVE:...

Read MoreRead more about Avian JVM vm::arrayCopy() Multiple Integer Overflows
osint
  • Vulnerabilities

SugarCRM < 10.1.0 (Reports Export) SQL Injection Vulnerability

August 18, 2020

Posted by Egidio Romano on Aug 11SugarCRM < 10.1.0 (Reports Export) SQL Injection Vulnerability *• Software Link:*https://www.sugarcrm.com *• Affected Versions:*...

Read MoreRead more about <div>SugarCRM < 10.1.0 (Reports Export) SQL Injection Vulnerability</div>
IMG_2301
  • News

Smart TVs can be used by hackers to spy on you

August 18, 2020

Arseniy Shcheltsin, CEO of Russian company Digital Platforms, said in an interview that modern TVs with Smart TV function are...

Read MoreRead more about Smart TVs can be used by hackers to spy on you
pexels-photo-1072851
  • News

For Privacy and Safety, Disable these features from your Google Assistance

August 18, 2020

It's difficult to imagine life without Google and every day the search engine gets more involved and intricate in our...

Read MoreRead more about For Privacy and Safety, Disable these features from your Google Assistance
IoT-PT_2_IoT-PT2528w2529
  • News

IoT-PT – A Virtual Environment For Pentesting IoT Devices

August 18, 2020

A new pentesting virtual environment for IoT DevicesDownload Link : https://drive.google.com/open?id=1XwGqkLax2irSPpwEpeAqypl9vEywzw3DMD5 : d9c20057b14cfa3fb25f744813b828df ; SHA1: 8828d693dc6c809377bab40d2bc26f525685e287OS info and RequirementsBase OS...

Read MoreRead more about IoT-PT – A Virtual Environment For Pentesting IoT Devices
urlbuster
  • News

Urlbuster – Powerful Mutable Web Directory Fuzzer To Bruteforce Existing And/Or Hidden Files Or Directories

August 18, 2020

Powerful web directory fuzzer to locate existing and/or hidden files or directories.Similar to dirb or gobuster, but with a lot...

Read MoreRead more about Urlbuster – Powerful Mutable Web Directory Fuzzer To Bruteforce Existing And/Or Hidden Files Or Directories
Stop-Attackers-in-Their-Tracks-with-Insight-Agent-Quarantine2
  • News

Stop Attackers in Their Tracks with Insight Agent Quarantine

August 18, 2020

Block the spread of malware and prevent lateral movement with Rapid7 Insight Agent Quarantine from InsightConnectRapid7’s Insight Agent is lightweight...

Read MoreRead more about Stop Attackers in Their Tracks with Insight Agent Quarantine
cyber-security-4785679_960_720
  • News

Emotet Malware Returned with Massive Malspam Campaign

August 17, 2020

The Emotet authors are popular for capitalizing on trending events and holidays by disseminating customized templates in form of Christmas...

Read MoreRead more about Emotet Malware Returned with Massive Malspam Campaign
osint
  • News

Facebook Struggles Against Hate Speech and Misinformation, Fails to Take Actions

August 17, 2020

In the last month, FB CEO Mark Zuckerberg and others met with civil rights activists to discuss FB's way of...

Read MoreRead more about Facebook Struggles Against Hate Speech and Misinformation, Fails to Take Actions
PowerSharpPack_1_Example
  • News

PowerSharpPack – Many usefull offensive CSharp Projects wraped into Powershell for easy usage

August 17, 2020

Many usefull offensive CSharp Projects wraped into Powershell for easy usage.Why? In my personal opinion offensive Powershell is not dead...

Read MoreRead more about PowerSharpPack – Many usefull offensive CSharp Projects wraped into Powershell for easy usage
spybrowse_4_img4
  • News

Spybrowse – Code Developed To Steal Certain Browser Config Files (History, Preferences, Etc)

August 17, 2020

Be sure to change the ftp variables throughout the code, these variables contain the username, password, & IP address of...

Read MoreRead more about Spybrowse – Code Developed To Steal Certain Browser Config Files (History, Preferences, Etc)
hacker-1725256_1280
  • News

Group-IB has identified a group of hackers engaged in corporate espionage

August 16, 2020

The hacker group RedCurl hacked companies around the world and stole corporate documents. The damage from its activities can amount...

Read MoreRead more about Group-IB has identified a group of hackers engaged in corporate espionage
osint
  • News

Indian Prime Minister Announces a New Cyber Security Policy for the Country

August 16, 2020

On the celebration of India's 74th Independence Day, the Prime Minister of India Narendra Modi announced his plans about bring...

Read MoreRead more about Indian Prime Minister Announces a New Cyber Security Policy for the Country
pexels-photo-238480-1
  • News

Facebook is testing Instagrams’ new messaging app, Threads with Automated Data Sharing

August 16, 2020

Facebook's team is working on a companion app for Instagram, called "Threads", which will automatically share your location, battery, a...

Read MoreRead more about Facebook is testing Instagrams’ new messaging app, Threads with Automated Data Sharing
CheckXSS_1
  • News

CheckXSS – Detect XSS vulnerability in Web Applications

August 16, 2020

Detect XSS vulnerability in Web ApplicationsScreenshotsEasy InstallationAs simple as below, Just one line of code:curl -L -s https://raw.githubusercontent.com/Jewel591/CheckXSS/master/docs/install.sh|bashUsage Instructionspython3.6 checkxss.py...

Read MoreRead more about CheckXSS – Detect XSS vulnerability in Web Applications
Phirautee_1
  • News

Phirautee – A PoC Crypto Virus To Spread User Awareness About Attacks And Implications Of Ransomwares

August 16, 2020

A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely...

Read MoreRead more about Phirautee – A PoC Crypto Virus To Spread User Awareness About Attacks And Implications Of Ransomwares
osint
  • News

Explosive technology and 3D printers: a history of deadly devices

August 15, 2020

Hackers: They’ll turn your computer into a BOMB! “Hackers turning computers into bombs” is a now legendary headline, taken from...

Read MoreRead more about Explosive technology and 3D printers: a history of deadly devices
osint
  • News

Russian Hackers Use Linux Malware Drovorub, NSA and FBI Finds Out

August 15, 2020

The NSA and FBI released a joint report today, which told about a new kind of Linux malware. According to...

Read MoreRead more about Russian Hackers Use Linux Malware Drovorub, NSA and FBI Finds Out
unfollow-plus_2_unfollow-plus
  • News

Unfollow-Plus – Automated Instagram Unfollower Bot

August 15, 2020

Automated Instagram Unfollower Bot.Installation :apt updateapt install git curl -ygit clone git://github.com/htr-tech/unfollow-plus.gitcd unfollow-plus> Run : bash unfollower.shSingle Command :apt update...

Read MoreRead more about Unfollow-Plus – Automated Instagram Unfollower Bot
dagobah_1_dagobah-dashboard
  • News

DAGOBAH – Open Source Tool To Generate Internal Threat Intelligence, Inventory & Compliance Data From AWS Resources

August 15, 2020

Dagobah is an open source tool written in python to automate the internal threat intelligence generation, inventory collection and compliance...

Read MoreRead more about DAGOBAH – Open Source Tool To Generate Internal Threat Intelligence, Inventory & Compliance Data From AWS Resources
rootkit-feature-200x200-1
  • News

XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

August 14, 2020

By Mac Threat Response and Mobile Research Team We have discovered an unusual infection related to Xcode developer projects. Upon...

Read MoreRead more about XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
Patch-Tuesday-200x125-1
  • News

August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild

August 14, 2020

The August batch of Patch Tuesday updates includes 120 updates for the Microsoft suite, with 17 fixes rated as Critical,...

Read MoreRead more about August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild

Posts pagination

Previous 1 … 3,989 3,990 3,991 3,992 3,993 3,994 3,995 … 4,069 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 167[.]99[.]76[.]115:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 115[.]175[.]39[.]35:443

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]36[.]228[.]26:8080

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 166[.]108[.]200[.]194:443

May 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel