Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Oralyzer_1
  • News

Oralyzer – Tool To Identify Open Redirection

July 30, 2020

Oralyzer, a simple python script, capable of identifying the open redirection vulnerability in a website. It does that by fuzzing...

Read MoreRead more about Oralyzer – Tool To Identify Open Redirection
osint
  • News

Botnet abuses Docker servers and crypto blockchain to deliver Doki backdoor

July 30, 2020

As user organizations move more of their business infrastructure off premises, cybercriminals become increasingly motivated to target Linux-based cloud environments,...

Read MoreRead more about Botnet abuses Docker servers and crypto blockchain to deliver Doki backdoor
osint
  • News

Cloud workload security: Should you worry about it?

July 30, 2020

Due to the increasing use of the cloud, organizations find themselves dealing with hybrid environments and nebulous workloads to secure....

Read MoreRead more about Cloud workload security: Should you worry about it?
cyber
  • News

COVID-19 used as a lure for Cyber Attacks: Report suggest massive increase in Phishing Trends

July 30, 2020

Since the starting of the year, 2020 has been a bearer of bad news and Covid seems like a bad...

Read MoreRead more about COVID-19 used as a lure for Cyber Attacks: Report suggest massive increase in Phishing Trends
icons8-google-play-480
  • News

Google Banned 29 Android Apps Containing Adware

July 30, 2020

A research discovered that almost all the malware are designed to target android users and in order to prevent users...

Read MoreRead more about Google Banned 29 Android Apps Containing Adware
abstract-digital-yellow-990x400-1
  • News

APT trends report Q2 2020

July 30, 2020

For more than three years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of...

Read MoreRead more about APT trends report Q2 2020
kubebox_1
  • News

Kubebox – Terminal And Web Console For Kubernetes

July 30, 2020

Terminal and Web console for KubernetesFeatures Configuration from kubeconfig files (KUBECONFIG environment variable or $HOME/.kube) Switch contexts interactively Authentication support...

Read MoreRead more about Kubebox – Terminal And Web Console For Kubernetes
Commit2BStream
  • News

Commit Stream – OSINT Tool For Finding Github Repositories By Extracting Commit Logs In Real Time From The Github Event API

July 30, 2020

commit-stream drinks commit logs from the Github event firehose exposing the author details (name and email address) associated with Github...

Read MoreRead more about Commit Stream – OSINT Tool For Finding Github Repositories By Extracting Commit Logs In Real Time From The Github Event API
secomea-moxa-wtg
  • News

Remote Code Execution Risks in Secomea, Moxa, and HMS eWon ICS VPN Vulnerabilities: What You Need to Know

July 30, 2020

On Wednesday, July 28, 2020, researchers at Claroty released information on a number of critical remote code execution vulnerabilities across...

Read MoreRead more about Remote Code Execution Risks in Secomea, Moxa, and HMS eWon ICS VPN Vulnerabilities: What You Need to Know
Rapid7-statement-on-privacy-and-status-of-EU-US-data-transfers-post-Schrems-II_
  • News

Rapid7 statement on privacy and status of EU-US data transfers post-Schrems II

July 30, 2020

SummaryContext: The Court of Justice of the European Union (CJEU) struck down the EU-US Privacy Shield (Privacy Shield) as a...

Read MoreRead more about Rapid7 statement on privacy and status of EU-US data transfers post-Schrems II
Joe-FitzPatrick-on-the-Future-of-Hardware-Security-Training-Sessions2
  • News

Joe FitzPatrick on the Future of Hardware Security Training Sessions

July 30, 2020

This week Rapid7 welcomes Joe FitzPatrick, a lead researcher at securinghardware.com, as he discusses what it takes to run a...

Read MoreRead more about Joe FitzPatrick on the Future of Hardware Security Training Sessions
Anonymous-600x452-1
  • News

TikTok is being discouraged and the app may be banned

July 29, 2020

In recent news retail giant Amazon sent a memo to employees telling them to delete the popular social media app...

Read MoreRead more about TikTok is being discouraged and the app may be banned
IMG_1988
  • News

The data of clients of the Russian bank Alfa-Bank leaked to the Network

July 29, 2020

On June 22, a message appeared on the Darknet about the sale of a database of clients of the largest...

Read MoreRead more about The data of clients of the Russian bank Alfa-Bank leaked to the Network
IMG_2014
  • News

The National Security and Defense Council of Ukraine reported a leak of IP addresses of government websites

July 29, 2020

The leaked list of hidden government IP addresses of government websites occurred in Ukraine. This is stated in the statement...

Read MoreRead more about The National Security and Defense Council of Ukraine reported a leak of IP addresses of government websites
ddos
  • News

New Network Protocols Abused To Launch Large-Scale Distributed Denial of Service (DDoS) Attacks

July 29, 2020

The Federal Bureau of Investigation issued an alert just the previous week cautioning about the discovery of new network protocols...

Read MoreRead more about New Network Protocols Abused To Launch Large-Scale Distributed Denial of Service (DDoS) Attacks
osint
  • News

Prometei: A Cryptomining Botnet that Attacks Microsoft’s Vulnerabilities

July 29, 2020

An unknown Botnet called "Prometei" is attacking windows and Microsoft devices (vulnerable) using brute force SMb exploits. According to Cisco...

Read MoreRead more about Prometei: A Cryptomining Botnet that Attacks Microsoft’s Vulnerabilities
abstract-blue-digital-man-990x400-1
  • News

Lazarus on the hunt for big game

July 29, 2020

We may only be six months in, but there’s little doubt that 2020 will go down in history as a...

Read MoreRead more about Lazarus on the hunt for big game
SNOWCRASH_1_snowcrash
  • News

SNOWCRASH – A Polyglot Payload Generator

July 29, 2020

A polyglot payload generator IntroductionSNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected...

Read MoreRead more about SNOWCRASH – A Polyglot Payload Generator
intelspy_1_logo
  • News

Intelspy – Perform Automated Network Reconnaissance Scans

July 29, 2020

Perform automated network reconnaissance scans to gather network intelligence.IntelSpy is a multi-threaded network intelligence spy tool which performs automated enumeration...

Read MoreRead more about Intelspy – Perform Automated Network Reconnaissance Scans
Plugin-Development-Made-Easy-With-Rapid72
  • News

Plugin Development Made Easy With Rapid7

July 29, 2020

"I've built plugins for four SOAR vendors, and your model was the most mature. You had the best code quality...

Read MoreRead more about Plugin Development Made Easy With Rapid7
osint
  • News

A week in security (July 20 – 26)

July 28, 2020

Last week on Malwarebytes Labs, our Lock and Code podcast delved into Bluetooth and beacon technology. We also dug into...

Read MoreRead more about A week in security (July 20 – 26)
browser-773217_960_720
  • News

Firefox expected to release a fix for their “Camera active after phone locks” bug this October

July 28, 2020

A bug in Mozilla Firefox enabled websites to keep the smartphone camera active even after leaving the browser or locking...

Read MoreRead more about Firefox expected to release a fix for their “Camera active after phone locks” bug this October
osint
  • News

Botnet Activity Goes Down; Revived Emotet Suffers Hindrances in Operations by A Vigilante Hacker

July 28, 2020

An anonymous vigilante hacker has been actively involved in obstructing 2019's most widespread cybercrime operation, Emotet that made a comeback...

Read MoreRead more about Botnet Activity Goes Down; Revived Emotet Suffers Hindrances in Operations by A Vigilante Hacker
TrustJack_1
  • News

TrustJack – Yet Another PoC For Hijacking DLLs in Windows

July 28, 2020

Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windowsBlogpost: https://redteamer.tips/?p=108To be used with a cmd that does whatever the F you want, for a...

Read MoreRead more about TrustJack – Yet Another PoC For Hijacking DLLs in Windows

Posts pagination

Previous 1 … 4,005 4,006 4,007 4,008 4,009 4,010 4,011 … 4,080 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 154[.]8[.]233[.]224:81

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 118[.]178[.]192[.]36:8092

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 196[.]251[.]83[.]52:80

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]200[.]183[.]130:80

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 193[.]188[.]23[.]150:443

May 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel