Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
kubebox_1
  • News

Kubebox – Terminal And Web Console For Kubernetes

July 30, 2020

Terminal and Web console for KubernetesFeatures Configuration from kubeconfig files (KUBECONFIG environment variable or $HOME/.kube) Switch contexts interactively Authentication support...

Read MoreRead more about Kubebox – Terminal And Web Console For Kubernetes
Commit2BStream
  • News

Commit Stream – OSINT Tool For Finding Github Repositories By Extracting Commit Logs In Real Time From The Github Event API

July 30, 2020

commit-stream drinks commit logs from the Github event firehose exposing the author details (name and email address) associated with Github...

Read MoreRead more about Commit Stream – OSINT Tool For Finding Github Repositories By Extracting Commit Logs In Real Time From The Github Event API
secomea-moxa-wtg
  • News

Remote Code Execution Risks in Secomea, Moxa, and HMS eWon ICS VPN Vulnerabilities: What You Need to Know

July 30, 2020

On Wednesday, July 28, 2020, researchers at Claroty released information on a number of critical remote code execution vulnerabilities across...

Read MoreRead more about Remote Code Execution Risks in Secomea, Moxa, and HMS eWon ICS VPN Vulnerabilities: What You Need to Know
Rapid7-statement-on-privacy-and-status-of-EU-US-data-transfers-post-Schrems-II_
  • News

Rapid7 statement on privacy and status of EU-US data transfers post-Schrems II

July 30, 2020

SummaryContext: The Court of Justice of the European Union (CJEU) struck down the EU-US Privacy Shield (Privacy Shield) as a...

Read MoreRead more about Rapid7 statement on privacy and status of EU-US data transfers post-Schrems II
Joe-FitzPatrick-on-the-Future-of-Hardware-Security-Training-Sessions2
  • News

Joe FitzPatrick on the Future of Hardware Security Training Sessions

July 30, 2020

This week Rapid7 welcomes Joe FitzPatrick, a lead researcher at securinghardware.com, as he discusses what it takes to run a...

Read MoreRead more about Joe FitzPatrick on the Future of Hardware Security Training Sessions
Anonymous-600x452-1
  • News

TikTok is being discouraged and the app may be banned

July 29, 2020

In recent news retail giant Amazon sent a memo to employees telling them to delete the popular social media app...

Read MoreRead more about TikTok is being discouraged and the app may be banned
IMG_1988
  • News

The data of clients of the Russian bank Alfa-Bank leaked to the Network

July 29, 2020

On June 22, a message appeared on the Darknet about the sale of a database of clients of the largest...

Read MoreRead more about The data of clients of the Russian bank Alfa-Bank leaked to the Network
IMG_2014
  • News

The National Security and Defense Council of Ukraine reported a leak of IP addresses of government websites

July 29, 2020

The leaked list of hidden government IP addresses of government websites occurred in Ukraine. This is stated in the statement...

Read MoreRead more about The National Security and Defense Council of Ukraine reported a leak of IP addresses of government websites
ddos
  • News

New Network Protocols Abused To Launch Large-Scale Distributed Denial of Service (DDoS) Attacks

July 29, 2020

The Federal Bureau of Investigation issued an alert just the previous week cautioning about the discovery of new network protocols...

Read MoreRead more about New Network Protocols Abused To Launch Large-Scale Distributed Denial of Service (DDoS) Attacks
osint
  • News

Prometei: A Cryptomining Botnet that Attacks Microsoft’s Vulnerabilities

July 29, 2020

An unknown Botnet called "Prometei" is attacking windows and Microsoft devices (vulnerable) using brute force SMb exploits. According to Cisco...

Read MoreRead more about Prometei: A Cryptomining Botnet that Attacks Microsoft’s Vulnerabilities
abstract-blue-digital-man-990x400-1
  • News

Lazarus on the hunt for big game

July 29, 2020

We may only be six months in, but there’s little doubt that 2020 will go down in history as a...

Read MoreRead more about Lazarus on the hunt for big game
SNOWCRASH_1_snowcrash
  • News

SNOWCRASH – A Polyglot Payload Generator

July 29, 2020

A polyglot payload generator IntroductionSNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected...

Read MoreRead more about SNOWCRASH – A Polyglot Payload Generator
intelspy_1_logo
  • News

Intelspy – Perform Automated Network Reconnaissance Scans

July 29, 2020

Perform automated network reconnaissance scans to gather network intelligence.IntelSpy is a multi-threaded network intelligence spy tool which performs automated enumeration...

Read MoreRead more about Intelspy – Perform Automated Network Reconnaissance Scans
Plugin-Development-Made-Easy-With-Rapid72
  • News

Plugin Development Made Easy With Rapid7

July 29, 2020

"I've built plugins for four SOAR vendors, and your model was the most mature. You had the best code quality...

Read MoreRead more about Plugin Development Made Easy With Rapid7
osint
  • News

A week in security (July 20 – 26)

July 28, 2020

Last week on Malwarebytes Labs, our Lock and Code podcast delved into Bluetooth and beacon technology. We also dug into...

Read MoreRead more about A week in security (July 20 – 26)
browser-773217_960_720
  • News

Firefox expected to release a fix for their “Camera active after phone locks” bug this October

July 28, 2020

A bug in Mozilla Firefox enabled websites to keep the smartphone camera active even after leaving the browser or locking...

Read MoreRead more about Firefox expected to release a fix for their “Camera active after phone locks” bug this October
osint
  • News

Botnet Activity Goes Down; Revived Emotet Suffers Hindrances in Operations by A Vigilante Hacker

July 28, 2020

An anonymous vigilante hacker has been actively involved in obstructing 2019's most widespread cybercrime operation, Emotet that made a comeback...

Read MoreRead more about Botnet Activity Goes Down; Revived Emotet Suffers Hindrances in Operations by A Vigilante Hacker
TrustJack_1
  • News

TrustJack – Yet Another PoC For Hijacking DLLs in Windows

July 28, 2020

Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windowsBlogpost: https://redteamer.tips/?p=108To be used with a cmd that does whatever the F you want, for a...

Read MoreRead more about TrustJack – Yet Another PoC For Hijacking DLLs in Windows
HawkScan_1_logo
  • News

HawkScan – Security Tool For Reconnaissance And Information Gathering On A Website

July 28, 2020

Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)This script use "WafW00f" to detect the...

Read MoreRead more about HawkScan – Security Tool For Reconnaissance And Information Gathering On A Website
Hear-from-Your-Peers-Advice-for-Your-First-90-Days-Using-a-Vulnerability-Management-Solution-
  • News

Hear from Your Peers: Advice for Your First 90 Days Using a Vulnerability Management Solution

July 28, 2020

Modern environments today are, well, complex. They often include a concoction of on-premises, cloud, container, and virtualization services. There’s a...

Read MoreRead more about Hear from Your Peers: Advice for Your First 90 Days Using a Vulnerability Management Solution
feature_ransomeware-200x200-1
  • News

Ensiko: A Webshell With Ransomware Capabilities

July 27, 2020

By Aliakbar Zahravi  Ensiko is a PHP web shell with ransomware capabilities that targets various platforms such as Linux, Windows,...

Read MoreRead more about Ensiko: A Webshell With Ransomware Capabilities
osint
  • News

Gothic Panda and Stone Panda: Chinese Hackers that Launched Mass Cyber Attacks on Indian Companies

July 27, 2020

Two Hacking groups from China named Gothic Panda and Stone Panda have been identified for organizing the majority of the...

Read MoreRead more about Gothic Panda and Stone Panda: Chinese Hackers that Launched Mass Cyber Attacks on Indian Companies
sitedorks
  • News

Sitedorks – Search Google/Bing/DuckDuckGo/Yandex/Yahoo For A Search Term With Different Websites

July 27, 2020

Search Google, Bing, Yahoo or Yandex for a search term with different websites. A default list is already provided, which...

Read MoreRead more about Sitedorks – Search Google/Bing/DuckDuckGo/Yandex/Yahoo For A Search Term With Different Websites
rengine_9
  • News

reNgine – An Automated Reconnaissance Framework Meant For Gathering Information During Penetration Testing Of Web Applications

July 27, 2020

reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan...

Read MoreRead more about reNgine – An Automated Reconnaissance Framework Meant For Gathering Information During Penetration Testing Of Web Applications

Posts pagination

Previous 1 … 3,994 3,995 3,996 3,997 3,998 3,999 4,000 … 4,069 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 167[.]99[.]76[.]115:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 115[.]175[.]39[.]35:443

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]36[.]228[.]26:8080

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 166[.]108[.]200[.]194:443

May 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel