Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
chalumeau_1_logo
  • News

Chalumeau – Automated, Extendable And Customizable Credential Dumping Tool

August 8, 2020

Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.Main FeaturesWrite your own PayloadsIn-Memory executionExtract Password ListDashboard...

Read MoreRead more about Chalumeau – Automated, Extendable And Customizable Credential Dumping Tool
virtual-vegas-day-two-rapid7
  • News

Virtual Black Hat: Rapid7 Experts Share Key Takeaways from Day 2 Sessions

August 8, 2020

This blog post is part 2 of a two-part blog series recapping Rapid7’s Black Hat debriefs as part of Virtual...

Read MoreRead more about Virtual Black Hat: Rapid7 Experts Share Key Takeaways from Day 2 Sessions
camera-1124585_1280
  • News

A hack that fools Face Recognition AI into false identification

August 7, 2020

Face recognition AI is increasingly being used at Airports and at other security outlets, especially during a pandemic to heed...

Read MoreRead more about A hack that fools Face Recognition AI into false identification
IMG_2162
  • News

Russian experts warned about the dangers of watching movies on pirate sites

August 7, 2020

 It is noted that hackers use streaming platforms, TV series and movies to distribute advertising and malware. They can add...

Read MoreRead more about Russian experts warned about the dangers of watching movies on pirate sites
IMG_2127
  • News

Number of fake delivery services increased in Russia

August 7, 2020

Alexander Vurasko, a leading Infosecurity analyst at Softline Company, said that during the pandemic, scammers learned how to qualitatively fake...

Read MoreRead more about Number of fake delivery services increased in Russia
VT
  • News

Inter skimming kit used in homoglyph attacks

August 7, 2020

As we continue to track web threats and credit card skimming in particular, we often rediscover techniques we’ve encountered elsewhere...

Read MoreRead more about Inter skimming kit used in homoglyph attacks
osint
  • News

ProctorU – 444,453 breached accounts

August 7, 2020

  In June 2020, the online exam service ProctorU suffered a data breach which was subsequently shared extensively across online...

Read MoreRead more about ProctorU – 444,453 breached accounts
fintech_abstract-990x400-1
  • News

Incident Response Analyst Report 2019

August 7, 2020

 Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility...

Read MoreRead more about Incident Response Analyst Report 2019
2020-08-07-ISC-diary-image-00a-1
  • News

TA551 (Shathak) Word docs push IcedID (Bokbot)

August 7, 2020

Introduction I've been tracking malicious Word documents from the TA551 (Shathak) campaign  This year, we've seen a lot of Valak...

Read MoreRead more about TA551 (Shathak) Word docs push IcedID (Bokbot)
osint
  • News

A Fork of the FTCode Powershell Ransomware, (Thu, Aug 6th)

August 7, 2020

Yesterday, I found a new malicious Powershell script that deserved to be analyzed due to the way it was dropped...

Read MoreRead more about A Fork of the FTCode Powershell Ransomware, (Thu, Aug 6th)
h92
  • News

Gtunnel – A Robust Tunelling Solution Written In Golang

August 7, 2020

A TCP tunneling suite built with golang and gRPC. gTunnel can manage multiple forward and reverse tunnels that are all...

Read MoreRead more about Gtunnel – A Robust Tunelling Solution Written In Golang
taowu-cobalt-strike_1_timg
  • News

Taowu – A CobaltStrike Toolkit

August 7, 2020

TaoWu(檮杌) is a CobaltStrike toolkit. All the scripts are gathered on the Internet and slightly modified by myself. You can...

Read MoreRead more about Taowu – A CobaltStrike Toolkit
vv-day-1-recap
  • News

Virtual Black Hat: Rapid7 Experts Share Key Takeaways from Day 1 Sessions

August 7, 2020

Boy, oh boy, has Black Hat changed. Where we once looked up at the neon lights of Las Vegas, we...

Read MoreRead more about Virtual Black Hat: Rapid7 Experts Share Key Takeaways from Day 1 Sessions
metasploit-ascii-1
  • News

Metasploit 6 Now Under Active Development

August 7, 2020

Today the Metasploit team is pleased to announce active development of Metasploit Framework 6.0, available now for testing and community...

Read MoreRead more about Metasploit 6 Now Under Active Development
osint
  • News

Data Accountability and Transparency Act of 2020 looks beyond consent

August 6, 2020

In the United States, data privacy is hard work—particularly for the American people. But one US Senator believes it shouldn’t...

Read MoreRead more about Data Accountability and Transparency Act of 2020 looks beyond consent
osint
  • News

Business email compromise: gunning for goal

August 6, 2020

The evergreen peril of business email compromise (BEC) finds itself in the news once more. This time, major English Premier...

Read MoreRead more about Business email compromise: gunning for goal
osint
  • News

Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks

August 6, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks
pexels-photo-238480
  • News

Here’s All you Need to Know About Instagram Reels; Launched Globally in Over 50 Countries

August 6, 2020

As TikTok fell prey to extensive criticism and was labeled as a 'threat to security' by governments, resulting in the...

Read MoreRead more about Here’s All you Need to Know About Instagram Reels; Launched Globally in Over 50 Countries
IMG_2124
  • News

The scale of data leaks of patients with coronavirus in Russia has become known

August 6, 2020

More than a third of all cases of leaks of personal data of patients with coronavirus, as well as suspected...

Read MoreRead more about The scale of data leaks of patients with coronavirus in Russia has become known
encryption
  • News

WastedLocker ransomware uses a sophisticated trick by abusing Windows features to avoid detection

August 6, 2020

WastedLocker has been in the highlights for a successful attack on wearable tech and smartwatch manufacturer Garmin and was paid...

Read MoreRead more about WastedLocker ransomware uses a sophisticated trick by abusing Windows features to avoid detection
UEFI_RETool_9_depend-graph
  • News

UEFI_RETool – A Tool For UEFI Firmware Reverse Engineering

August 6, 2020

A tool for UEFI firmware reverse engineering.UEFI firmware analysis with uefi_retool.py scriptUsage:Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins...

Read MoreRead more about UEFI_RETool – A Tool For UEFI Firmware Reverse Engineering
Netenum_4_screen
  • News

Netenum – A Tool To Passively Discover Active Hosts On A Network

August 6, 2020

Network reconnaisance tool that sniffs for active hostsIntroductionNetenum passively monitors the ARP traffic on the network. It extracts basic data...

Read MoreRead more about Netenum – A Tool To Passively Discover Active Hosts On A Network
election-4745282_960_720
  • News

Google Bans Hacked Political Content Ahead of the US Elections, Implements New Google Ads Policy

August 5, 2020

The presidential elections in the US are near. Keeping this in mind, Google has announced a new policy that will...

Read MoreRead more about Google Bans Hacked Political Content Ahead of the US Elections, Implements New Google Ads Policy
IMG_2119
  • News

Personal data of one million Moscow car owners were put up for sale on the Internet

August 5, 2020

On July 24, an archive with a database of motorists was put up for sale on one of the forums...

Read MoreRead more about Personal data of one million Moscow car owners were put up for sale on the Internet

Posts pagination

Previous 1 … 4,003 4,004 4,005 4,006 4,007 4,008 4,009 … 4,080 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[MEDUSA] – Ransomware Victim: DSI Tech

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 154[.]8[.]233[.]224:81

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 118[.]178[.]192[.]36:8092

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 196[.]251[.]83[.]52:80

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]200[.]183[.]130:80

May 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel