Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

184dc77883d17b22631baf15b8eefd5c9a0a81e791bf956c7cd96395f025f208
  • Tools

Witcher – Managing GitHub Advanced Security (GHAS) Controls At Scale

May 9, 2025
6f8de8be21463cbfd51711ae4557ed9ba1d79bce93e0152c4ad0b56181bcc30e
  • Tools

ByeDPIAndroid – App To Bypass Censorship On Android

May 9, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Forerunner
  • News

Forerunner – Fast And Extensible Network Scanning Library Featuring Multithreading, Ping Probing, And Scan Fetchers

June 2, 2020

The Forerunner library is a fast, lightweight, and extensible networking library created to aid in the development of robust network...

Read MoreRead more about Forerunner – Fast And Extensible Network Scanning Library Featuring Multithreading, Ping Probing, And Scan Fetchers
enumy
  • News

Enumy – Linux Post Exploitation Privilege Escalation Enumeration

June 2, 2020

Enumy is portable executable that you drop on target Linux machine during a pentest or CTF in the post exploitation...

Read MoreRead more about Enumy – Linux Post Exploitation Privilege Escalation Enumeration
cisa-logo-002
  • News

A Series Of Cyber Essentials Toolkits Released To Address Cyber-Security Risks

June 1, 2020

As a major starting point for small businesses and government agencies to comprehend and address cybersecurity risk as they indulge...

Read MoreRead more about A Series Of Cyber Essentials Toolkits Released To Address Cyber-Security Risks
jackpotting
  • News

Github Escapes from Octopus Malware that Affected its 26 Software Projects

June 1, 2020

Github, a platform where every malicious software report is equally different in its place, manages to escape from a malware...

Read MoreRead more about Github Escapes from Octopus Malware that Affected its 26 Software Projects
bing-ip2hosts_3
  • News

Bing-Ip2Hosts – Bingip2Hosts Is A Bing.com Web Scraper That Discovers Websites By IP Address

June 1, 2020

Bing-ip2hosts is a Bing.com web scraper to discover hostnames by IP address.DescriptionBing-ip2hosts is a Bing.com web scraper that discovers hostnames...

Read MoreRead more about Bing-Ip2Hosts – Bingip2Hosts Is A Bing.com Web Scraper That Discovers Websites By IP Address
vault
  • News

Vault – A Tool For Secrets Management, Encryption As A Service, And Privileged Access Management

June 1, 2020

Please note: We take Vault's security and our users' trust very seriously. If you believe you have found a security...

Read MoreRead more about Vault – A Tool For Secrets Management, Encryption As A Service, And Privileged Access Management
social-media-763731_1280
  • News

Religion Biased Algorithms Continue to Depict How Facebook Doesn’t Believe in Free Speech

May 31, 2020

Facebook's brand image has taken a critical hit long ago falling from the top ten global brands list, the brand...

Read MoreRead more about Religion Biased Algorithms Continue to Depict How Facebook Doesn’t Believe in Free Speech
IMG_1030
  • News

Russian hackers attacked Poland due to NATO exercises

May 31, 2020

The Polish government announced a large-scale information attack by Russia, which is aimed at worsening relations between Warsaw and Washington,...

Read MoreRead more about Russian hackers attacked Poland due to NATO exercises
22-1
  • News

StrandHogg is Back and Stronger As a More Sophisticated Vulnerability

May 31, 2020

Android is vulnerable anew owing it to a new vulnerability which goes by the name of “StrandHogg 2.0”That is right....

Read MoreRead more about StrandHogg is Back and Stronger As a More Sophisticated Vulnerability
activeDirectory-1
  • News

ADCollector – A Lightweight Tool To Quickly Extract Valuable Information From The Active Directory Environment For Both Attacking And Defending

May 31, 2020

ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you...

Read MoreRead more about ADCollector – A Lightweight Tool To Quickly Extract Valuable Information From The Active Directory Environment For Both Attacking And Defending
andrax-logo
  • News

ANDRAX v5R NH-Killer – Penetration Testing on Android

May 31, 2020

ANDRAX is a Penetration Testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it behaves like...

Read MoreRead more about ANDRAX v5R NH-Killer – Penetration Testing on Android
osint
  • News

Shiny Hunters’ latest hit: Minted among 73.1M records offered

May 30, 2020

More details have emerged about hacker group “Shiny Hunters’” prey this past month of more than 11 website victims, including...

Read MoreRead more about Shiny Hunters’ latest hit: Minted among 73.1M records offered
Maze_dumpsite-600x204-1
  • News

Maze: the ransomware that introduced an extra twist

May 30, 2020

An extra way to create leverage against victims of ransomware has been introduced by the developers of the Maze ransomware....

Read MoreRead more about Maze: the ransomware that introduced an extra twist
IMG_1013
  • News

Telegram has withdrawn its appeal against the ban on issuing Gram tokens

May 30, 2020

The company appealed the court decision in March, but then the founder of the messenger, Pavel Durov, announced the termination...

Read MoreRead more about Telegram has withdrawn its appeal against the ban on issuing Gram tokens
IMG_20200529_142516
  • News

WhatsApp Scam: Hackers stealing Verification Codes from Users

May 30, 2020

WhatsApp Messenger, a cross-platform messaging app owned by Facebook is the most popular messaging application in the world and recently...

Read MoreRead more about WhatsApp Scam: Hackers stealing Verification Codes from Users
droidfiles_1
  • News

DroidFiles – Get Files From Android Directories

May 30, 2020

Get files from Android directories, internal and external storage (Pictures, Downloads, Whatsapp, Videos, ...)Legal disclaimer:Usage of DroidFiles for attacking targets...

Read MoreRead more about DroidFiles – Get Files From Android Directories
purify_1_logo_trans
  • News

Purify – All-in-one Tool For Managing Vulnerability Reports From AppSec Pipelines

May 30, 2020

All-in-one tool for managing vulnerability reportsWhyThe goal of Purify to be an easy-in-use and efficient tool to simplify a workflow...

Read MoreRead more about Purify – All-in-one Tool For Managing Vulnerability Reports From AppSec Pipelines
osint
  • News

The best test for an EDR solution is one that works for you

May 29, 2020

Since its inception, the endpoint detection and response (EDR) market has evolved rapidly with new innovations to better address the...

Read MoreRead more about The best test for an EDR solution is one that works for you
osint
  • News

German Intelligence Warns Companies of Potential Hacking Threats from Russia

May 29, 2020

According to German intelligence agencies, a group of hackers from the Kremlin are targeting German infrastructures like energy, water, and...

Read MoreRead more about German Intelligence Warns Companies of Potential Hacking Threats from Russia
securelist_abs_11-990x400-1
  • News

The zero-day exploits of Operation WizardOpium

May 29, 2020

Back in October 2019 we detected a classic watering-hole attack on a North Korea-related news site that exploited a chain...

Read MoreRead more about The zero-day exploits of Operation WizardOpium
MemoryMapper_1
  • News

MemoryMapper – Lightweight Library Which Allows The Ability To Map Both Native And Managed Assemblies Into Memory

May 29, 2020

Memory Mapper is a lightweight library which allows the ability to map both native and managed assemblies into memory by...

Read MoreRead more about MemoryMapper – Lightweight Library Which Allows The Ability To Map Both Native And Managed Assemblies Into Memory
iky
  • News

Project iKy v2.6.0 – Tool That Collects Information From An Email And Shows Results In A Nice Visual Interface

May 29, 2020

Project iKy is a tool that collects information from an email and shows results in a nice visual interface.Visit the...

Read MoreRead more about Project iKy v2.6.0 – Tool That Collects Information From An Email And Shows Results In A Nice Visual Interface
The-Masked-SYNger-Investigating-a-Traffic-Phenomenon3
  • News

The Masked SYNger: Investigating a Traffic Phenomenon

May 29, 2020

Where we would expect the “day interval” to simply count up from 0 (only appeared one day) to 1,2,3, etc.,...

Read MoreRead more about The Masked SYNger: Investigating a Traffic Phenomenon
ansible-architecture
  • Tutorials

Ansible Security Assessment

May 28, 2020

Introduction Ansible is an open-source software that automates configuration management and software deployment. If you're not familiar with Ansible, we...

Read MoreRead more about Ansible Security Assessment

Posts pagination

Previous 1 … 4,010 4,011 4,012 4,013 4,014 4,015 4,016 … 4,069 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 167[.]99[.]76[.]115:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 185[.]208[.]159[.]224:80

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 115[.]175[.]39[.]35:443

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]36[.]228[.]26:8080

May 11, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 166[.]108[.]200[.]194:443

May 11, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel