Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
HawkScan_1_logo
  • News

HawkScan – Security Tool For Reconnaissance And Information Gathering On A Website

July 28, 2020

Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)This script use "WafW00f" to detect the...

Read MoreRead more about HawkScan – Security Tool For Reconnaissance And Information Gathering On A Website
Hear-from-Your-Peers-Advice-for-Your-First-90-Days-Using-a-Vulnerability-Management-Solution-
  • News

Hear from Your Peers: Advice for Your First 90 Days Using a Vulnerability Management Solution

July 28, 2020

Modern environments today are, well, complex. They often include a concoction of on-premises, cloud, container, and virtualization services. There’s a...

Read MoreRead more about Hear from Your Peers: Advice for Your First 90 Days Using a Vulnerability Management Solution
feature_ransomeware-200x200-1
  • News

Ensiko: A Webshell With Ransomware Capabilities

July 27, 2020

By Aliakbar Zahravi  Ensiko is a PHP web shell with ransomware capabilities that targets various platforms such as Linux, Windows,...

Read MoreRead more about Ensiko: A Webshell With Ransomware Capabilities
osint
  • News

Gothic Panda and Stone Panda: Chinese Hackers that Launched Mass Cyber Attacks on Indian Companies

July 27, 2020

Two Hacking groups from China named Gothic Panda and Stone Panda have been identified for organizing the majority of the...

Read MoreRead more about Gothic Panda and Stone Panda: Chinese Hackers that Launched Mass Cyber Attacks on Indian Companies
sitedorks
  • News

Sitedorks – Search Google/Bing/DuckDuckGo/Yandex/Yahoo For A Search Term With Different Websites

July 27, 2020

Search Google, Bing, Yahoo or Yandex for a search term with different websites. A default list is already provided, which...

Read MoreRead more about Sitedorks – Search Google/Bing/DuckDuckGo/Yandex/Yahoo For A Search Term With Different Websites
rengine_9
  • News

reNgine – An Automated Reconnaissance Framework Meant For Gathering Information During Penetration Testing Of Web Applications

July 27, 2020

reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan...

Read MoreRead more about reNgine – An Automated Reconnaissance Framework Meant For Gathering Information During Penetration Testing Of Web Applications
IMG_1957
  • News

Databases of users of Russian ad services Avito and Yula have appeared on the network

July 26, 2020

Six files with tables in CSV format are in the public domain, which means that anyone can download them. Each...

Read MoreRead more about Databases of users of Russian ad services Avito and Yula have appeared on the network
osint
  • News

Aberystwyth University and others affected by Blackbaud Global Ransomattack

July 26, 2020

Aberystwyth University, a 148-year-old mid-Wales institution was attacked via a hack on Blackbaud, a US company that deals with education...

Read MoreRead more about Aberystwyth University and others affected by Blackbaud Global Ransomattack
Autoenum
  • News

Autoenum – Automatic Service Enumeration Script

July 26, 2020

Autoenum is a recon tool which performs automatic enumeration of services discovered. I built this to save some time during...

Read MoreRead more about Autoenum – Automatic Service Enumeration Script
AuthMatrix_1_img1
  • News

AuthMatrix – A Burp Suite Extension That Provides A Simple Way To Test Authorization

July 26, 2020

AuthMatrix is an extension to Burp Suite that provides a simple way to test authorization in web applications and web...

Read MoreRead more about AuthMatrix – A Burp Suite Extension That Provides A Simple Way To Test Authorization
airtel-logo-AEFF942276-seeklogo.com_
  • News

eSIM Swapping Fraud: Cyber Criminals Targeting Airtel Customers in Hyderabad

July 25, 2020

Hyderabad witnessed three back to back cases of cyberfraud wherein criminals targeted Airtel customers promising them eSIM connection that led...

Read MoreRead more about eSIM Swapping Fraud: Cyber Criminals Targeting Airtel Customers in Hyderabad
IMG_0817
  • News

Experts found targeted attacks by hackers from North Korea on Russia

July 25, 2020

Kaspersky Lab revealed that the well-known North Korean hacker group Lazarus has become active in Russia. The attackers attack through...

Read MoreRead more about Experts found targeted attacks by hackers from North Korea on Russia
permission-manager_1_flow
  • News

Permission Manager – A Project That Brings Sanity To Kubernetes RBAC And Users Management, Web UI FTW

July 25, 2020

Welcome to the Permission Manager!Permission Manager is an application developed by SIGHUP that enables a super-easy and user-friendly RBAC management...

Read MoreRead more about Permission Manager – A Project That Brings Sanity To Kubernetes RBAC And Users Management, Web UI FTW
Quiver
  • News

Quiver – Tool To Manage All Of Your Tools For Bug Bounty Hunting And Penetration Testing

July 24, 2020

Quiver is the tool to manage all of your tools. It's an opinionated and curated collection of commands, notes and...

Read MoreRead more about Quiver – Tool To Manage All Of Your Tools For Bug Bounty Hunting And Penetration Testing
osint
  • News

Deepfakes or not: new GAN image stirs up questions about digital fakery

July 24, 2020

Subversive deepfakes that enter the party unannounced, do their thing, then slink off into the night without anybody noticing are...

Read MoreRead more about Deepfakes or not: new GAN image stirs up questions about digital fakery
North_Korea
  • News

Discovery of a New Malware Framework and Its Linkages with a North Korean Hacker Group

July 24, 2020

The discovery of a brand new malware framework and its linkages with a North Korean hacker group has heightened the...

Read MoreRead more about Discovery of a New Malware Framework and Its Linkages with a North Korean Hacker Group
computer-1591018_960_720
  • News

Hackers Breached into Twilio’s AWS; Company Confirms the Attack

July 24, 2020

In a recent cybersecurity breach incident, Twilio acknowledges that hackers breached into the company's cloud services (unsecured) and compromised its...

Read MoreRead more about Hackers Breached into Twilio’s AWS; Company Confirms the Attack
onex_2
  • News

Onex – A Library Of Hacking Tools For Termux And Other Linux Distributions

July 24, 2020

"onex a hacking tools library." Onex is a kali linux hacking tools installer for termux and other linux distribution. It's...

Read MoreRead more about Onex – A Library Of Hacking Tools For Termux And Other Linux Distributions
Kali-Linux-Tools-Interface_5_logo
  • News

Kali-Linux-Tools-Interface – Graphical Web Interface Developed To Facilitate The Use Of Security Information Tools

July 24, 2020

A graphical interface to use information security tools by the browser. Getting StartedKali Linux Tools Interface is a graphical interface...

Read MoreRead more about Kali-Linux-Tools-Interface – Graphical Web Interface Developed To Facilitate The Use Of Security Information Tools
Path
  • News

CVE-2020-3452 Cisco ASA / Firepower Read-Only Path Traversal Vulnerability: What You Need to Know

July 24, 2020

On July 22, Cisco released a patch for a high-severity read-only patch traversal vulnerability in its Cisco Adaptive Security Appliance...

Read MoreRead more about CVE-2020-3452 Cisco ASA / Firepower Read-Only Path Traversal Vulnerability: What You Need to Know
Update
  • News

What’s New in InsightIDR: H1 2020 in Review

July 24, 2020

We’ve continued to make enhancements around our Custom Parsing Tool. Most recently, we’ve made it easier for customers to define...

Read MoreRead more about What’s New in InsightIDR: H1 2020 in Review
osint
  • News

Dacls RAT’s goals are to steal customer data and spread ransomware

July 23, 2020

The Dacls remote access trojan that is capable of attacking Windows, Linux and macOS environments has been used to distribute...

Read MoreRead more about Dacls RAT’s goals are to steal customer data and spread ransomware
osint
  • News

EncroChat system eavesdropped on by law enforcement

July 23, 2020

Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security...

Read MoreRead more about EncroChat system eavesdropped on by law enforcement
IMG_1929
  • News

An IT expert at the Russian State Duma Explains Data Risks of Using VPN

July 23, 2020

"To prevent hackers from getting personal data of users, users don't need to use a VPN connection in their daily...

Read MoreRead more about An IT expert at the Russian State Duma Explains Data Risks of Using VPN

Posts pagination

Previous 1 … 4,006 4,007 4,008 4,009 4,010 4,011 4,012 … 4,080 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 154[.]8[.]233[.]224:81

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 118[.]178[.]192[.]36:8092

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 196[.]251[.]83[.]52:80

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]200[.]183[.]130:80

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 193[.]188[.]23[.]150:443

May 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel