Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
fintech_abstract-990x400-1
  • News

Incident Response Analyst Report 2019

August 7, 2020

 Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility...

Read MoreRead more about Incident Response Analyst Report 2019
2020-08-07-ISC-diary-image-00a-1
  • News

TA551 (Shathak) Word docs push IcedID (Bokbot)

August 7, 2020

Introduction I've been tracking malicious Word documents from the TA551 (Shathak) campaign  This year, we've seen a lot of Valak...

Read MoreRead more about TA551 (Shathak) Word docs push IcedID (Bokbot)
osint
  • News

A Fork of the FTCode Powershell Ransomware, (Thu, Aug 6th)

August 7, 2020

Yesterday, I found a new malicious Powershell script that deserved to be analyzed due to the way it was dropped...

Read MoreRead more about A Fork of the FTCode Powershell Ransomware, (Thu, Aug 6th)
h92
  • News

Gtunnel – A Robust Tunelling Solution Written In Golang

August 7, 2020

A TCP tunneling suite built with golang and gRPC. gTunnel can manage multiple forward and reverse tunnels that are all...

Read MoreRead more about Gtunnel – A Robust Tunelling Solution Written In Golang
taowu-cobalt-strike_1_timg
  • News

Taowu – A CobaltStrike Toolkit

August 7, 2020

TaoWu(檮杌) is a CobaltStrike toolkit. All the scripts are gathered on the Internet and slightly modified by myself. You can...

Read MoreRead more about Taowu – A CobaltStrike Toolkit
vv-day-1-recap
  • News

Virtual Black Hat: Rapid7 Experts Share Key Takeaways from Day 1 Sessions

August 7, 2020

Boy, oh boy, has Black Hat changed. Where we once looked up at the neon lights of Las Vegas, we...

Read MoreRead more about Virtual Black Hat: Rapid7 Experts Share Key Takeaways from Day 1 Sessions
metasploit-ascii-1
  • News

Metasploit 6 Now Under Active Development

August 7, 2020

Today the Metasploit team is pleased to announce active development of Metasploit Framework 6.0, available now for testing and community...

Read MoreRead more about Metasploit 6 Now Under Active Development
osint
  • News

Data Accountability and Transparency Act of 2020 looks beyond consent

August 6, 2020

In the United States, data privacy is hard work—particularly for the American people. But one US Senator believes it shouldn’t...

Read MoreRead more about Data Accountability and Transparency Act of 2020 looks beyond consent
osint
  • News

Business email compromise: gunning for goal

August 6, 2020

The evergreen peril of business email compromise (BEC) finds itself in the news once more. This time, major English Premier...

Read MoreRead more about Business email compromise: gunning for goal
osint
  • News

Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks

August 6, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks
pexels-photo-238480
  • News

Here’s All you Need to Know About Instagram Reels; Launched Globally in Over 50 Countries

August 6, 2020

As TikTok fell prey to extensive criticism and was labeled as a 'threat to security' by governments, resulting in the...

Read MoreRead more about Here’s All you Need to Know About Instagram Reels; Launched Globally in Over 50 Countries
IMG_2124
  • News

The scale of data leaks of patients with coronavirus in Russia has become known

August 6, 2020

More than a third of all cases of leaks of personal data of patients with coronavirus, as well as suspected...

Read MoreRead more about The scale of data leaks of patients with coronavirus in Russia has become known
encryption
  • News

WastedLocker ransomware uses a sophisticated trick by abusing Windows features to avoid detection

August 6, 2020

WastedLocker has been in the highlights for a successful attack on wearable tech and smartwatch manufacturer Garmin and was paid...

Read MoreRead more about WastedLocker ransomware uses a sophisticated trick by abusing Windows features to avoid detection
UEFI_RETool_9_depend-graph
  • News

UEFI_RETool – A Tool For UEFI Firmware Reverse Engineering

August 6, 2020

A tool for UEFI firmware reverse engineering.UEFI firmware analysis with uefi_retool.py scriptUsage:Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins...

Read MoreRead more about UEFI_RETool – A Tool For UEFI Firmware Reverse Engineering
Netenum_4_screen
  • News

Netenum – A Tool To Passively Discover Active Hosts On A Network

August 6, 2020

Network reconnaisance tool that sniffs for active hostsIntroductionNetenum passively monitors the ARP traffic on the network. It extracts basic data...

Read MoreRead more about Netenum – A Tool To Passively Discover Active Hosts On A Network
election-4745282_960_720
  • News

Google Bans Hacked Political Content Ahead of the US Elections, Implements New Google Ads Policy

August 5, 2020

The presidential elections in the US are near. Keeping this in mind, Google has announced a new policy that will...

Read MoreRead more about Google Bans Hacked Political Content Ahead of the US Elections, Implements New Google Ads Policy
IMG_2119
  • News

Personal data of one million Moscow car owners were put up for sale on the Internet

August 5, 2020

On July 24, an archive with a database of motorists was put up for sale on one of the forums...

Read MoreRead more about Personal data of one million Moscow car owners were put up for sale on the Internet
DLInjector-GUI_1
  • News

DLInjector-GUI – DLL Injector Graphical User Interface

August 5, 2020

DLInjector for Graphical User Interface.Faster DLL Injector for processes. It targets the process name to identify the target. The process...

Read MoreRead more about DLInjector-GUI – DLL Injector Graphical User Interface
xeca_1_empire
  • News

Xeca – PowerShell Payload Generator

August 5, 2020

xeca is a project that creates encrypted PowerShell payloads for offensive purposes.Creating position independent shellcode from DLL files is also...

Read MoreRead more about Xeca – PowerShell Payload Generator
InsightIDR-Connects-to-Zoom-for-Easy-Monitoring-2
  • News

InsightIDR Now Connects to Zoom for Easy Monitoring

August 5, 2020

Zoom adoption has skyrocketed with spikes in remote working, but web application security needs to be a top priority to...

Read MoreRead more about InsightIDR Now Connects to Zoom for Easy Monitoring
graph
  • Tutorials

Why are Frida and QBDI a Great Blend on Android?

August 4, 2020

Introduction Reverse engineering of Android applications is usually considered as somewhat effortless because of the possibility of retrieving the Java...

Read MoreRead more about Why are Frida and QBDI a Great Blend on Android?
hackers
  • News

The Council of the EU and Its First-Ever Sanctions against Persons or Entities Involved in Various Cyber-Attacks

August 4, 2020

The Council of the European Union imposed its first-ever sanction against persons or entities engaged with different cyber-attacks focusing on...

Read MoreRead more about The Council of the EU and Its First-Ever Sanctions against Persons or Entities Involved in Various Cyber-Attacks
cnitch_5_screen2
  • News

Cnitch – Container Snitch Checks Running Processes Under The Docker Engine And Alerts If Any Are Found To Be Running As Root

August 4, 2020

cnitch (snitch or container snitch) is a simple framework and command line tool for monitoring Docker containers to identify any...

Read MoreRead more about Cnitch – Container Snitch Checks Running Processes Under The Docker Engine And Alerts If Any Are Found To Be Running As Root
Mistica_1_mistica
  • News

Mistica – An Open Source Swiss Army Knife For Arbitrary Communication Over Application Protocols

August 4, 2020

Mística is a tool that allows to embed data into application layer protocol fields, with the goal of establishing a...

Read MoreRead more about Mistica – An Open Source Swiss Army Knife For Arbitrary Communication Over Application Protocols

Posts pagination

Previous 1 … 3,992 3,993 3,994 3,995 3,996 3,997 3,998 … 4,069 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 167[.]99[.]76[.]115:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 115[.]175[.]39[.]35:443

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]36[.]228[.]26:8080

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 166[.]108[.]200[.]194:443

May 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel