Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Variant of Mac malware ‘Shlayer’ spreads via poisoned web searches

June 23, 2020

Researchers have discovered a new variant of Shlayer Mac malware that  bypasses Apple’s built-in security protections and is being spread...

Read MoreRead more about Variant of Mac malware ‘Shlayer’ spreads via poisoned web searches
osint
  • News

Lock and Code S1Ep9: Strengthening and forgetting passwords with Matt Davey and Kyle Swank

June 23, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep9: Strengthening and forgetting passwords with Matt Davey and Kyle Swank
IMG_1463
  • News

Expert says Durov the main role in the process that will end the US monopoly

June 23, 2020

One of the most discussed news in the Internet community was the unblocking of the popular Telegram messenger by Roskomnadzor....

Read MoreRead more about Expert says Durov the main role in the process that will end the US monopoly
osint
  • News

CSIRO’s Data61 Developed Voice Liveness Detection ‘Void’ to Safeguard Users Against Voice Spoofing Attacks

June 23, 2020

Spoofing attacks that impersonate user's devices to steal data, spread malware, or bypass access controls are becoming increasingly popular as...

Read MoreRead more about CSIRO’s Data61 Developed Voice Liveness Detection ‘Void’ to Safeguard Users Against Voice Spoofing Attacks
securelist_graph_abstract-990x400-1
  • News

Web skimming with Google Analytics

June 23, 2020

Web skimming is a common class of attacks generally aimed at online shoppers. The principle is quite simple: malicious code...

Read MoreRead more about Web skimming with Google Analytics
sayhello_1
  • News

SAyHello – Capturing Audio (.Wav) From Target Using A Link

June 23, 2020

Capturing audio (.wav) from target using a linkHow it works?After the user grants microphone permissions, a website redirect button of...

Read MoreRead more about SAyHello – Capturing Audio (.Wav) From Target Using A Link
lynis2.1.1
  • News

Lynis 3.0.0 – Security Auditing Tool for Unix/Linux Systems

June 23, 2020

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core...

Read MoreRead more about Lynis 3.0.0 – Security Auditing Tool for Unix/Linux Systems
Advancements-in-Vulnerability-Reporting-in-the-Post-PGP-Era-A-Conversation-with-Art-Manion
  • News

Advancements in Vulnerability Reporting in the Post-PGP Era: A Conversation with Art Manion

June 23, 2020

On this week’s episode of Security Nation, Art Manion of the CERT Coordination Center gets us up to speed on...

Read MoreRead more about Advancements in Vulnerability Reporting in the Post-PGP Era: A Conversation with Art Manion
download
  • News

One Of Tech Giant Oracle’s Many Start-ups Uses Tracking Tech to Follow Users around the Web

June 22, 2020

The multinational computer technology corporation Oracle has spent almost 10 years and billions of dollars purchasing startups to fabricate its...

Read MoreRead more about One Of Tech Giant Oracle’s Many Start-ups Uses Tracking Tech to Follow Users around the Web
recon
  • News

O.G. AUTO-RECON – Enumerate A Target Based Off Of Nmap Results

June 22, 2020

Enumerate a target Based off of Nmap ResultsFeaturesThe purpose of O.G. Auto-Recon is to automate the initial information gathering phase...

Read MoreRead more about O.G. AUTO-RECON – Enumerate A Target Based Off Of Nmap Results
Zip2BCracker
  • News

Zip Cracker – Python Script To Crack Zip Password With Dictionary Attack And Also Use Crunch As Pipeline

June 22, 2020

This Script Supports Only Zip File in This VersionYou Can Also Use This Script With crunchCross-platform SupportedUsage: zipcracker.py Options: --version...

Read MoreRead more about Zip Cracker – Python Script To Crack Zip Password With Dictionary Attack And Also Use Crunch As Pipeline
IMG_1412
  • News

Sberbank Says Cyber Criminals Using Artificial Intelligence In Banking Trojan

June 21, 2020

Hackers, using artificial intelligence, created a new generation of banking Trojans, which is quite difficult to recognize, said Deputy Chairman...

Read MoreRead more about Sberbank Says Cyber Criminals Using Artificial Intelligence In Banking Trojan
security-2337429_1280
  • News

Cognizant Reveals Employees Data Compromised by Maze Ransomware

June 21, 2020

Leading IT services company, Cognizant was hit by a Maze Ransomware attack earlier in April this year that made headlines...

Read MoreRead more about Cognizant Reveals Employees Data Compromised by Maze Ransomware
DroidTracker_1
  • News

DroidTracker – Script To Generate An Android App To Track Location In Real Time

June 21, 2020

Script to generate an Android App to track location in real timeFeatures:Custom App Name2 Port Forwarding options (Ngrok or using...

Read MoreRead more about DroidTracker – Script To Generate An Android App To Track Location In Real Time
iox
  • News

Iox – Tool For Port Forward &Amp; Intranet Proxy

June 21, 2020

Tool for port forward & intranet proxy, just like lcx/ew, but betterWhy write?lcx and ew are awesome, but can be...

Read MoreRead more about Iox – Tool For Port Forward &Amp; Intranet Proxy
960x0
  • News

SMS System Now A Long-Gone Era; Google Brings Out A New Update

June 20, 2020

With the rise of encrypted alternatives of SMS messages, WhatsApp, iMessage, and Signal, the SMS system has become a 'throwback...

Read MoreRead more about SMS System Now A Long-Gone Era; Google Brings Out A New Update
IMG_1378
  • News

Medvedev: law enforcement agencies will need new technologies for detecting cybercrime

June 20, 2020

According to the Deputy head of the Russian Security Council, the Internet is becoming more open, and this makes it...

Read MoreRead more about Medvedev: law enforcement agencies will need new technologies for detecting cybercrime
matrix-5028024_960_720
  • News

Secondary Infektion: A Russian Disinformation Operation Agency You Need to Know About

June 20, 2020

The secret campaign was famous as "Secondary Infektion," and it worked separately from the IRA and GRU, staying hidden for...

Read MoreRead more about Secondary Infektion: A Russian Disinformation Operation Agency You Need to Know About
abstract-digital-990x400-1
  • News

Microcin is here

June 20, 2020

In February 2020, we observed a Trojan injected into the system process memory on a particular host. The target turned...

Read MoreRead more about Microcin is here
oss-fuzz_1_process
  • News

OSS-Fuzz – Continuous Fuzzing Of Open Source Software

June 20, 2020

Fuzz testing is a well-known technique for uncovering programming errors in software. Many of these detectable errors, like buffer overflow,...

Read MoreRead more about OSS-Fuzz – Continuous Fuzzing Of Open Source Software
vhosts-sieve
  • News

Vhosts-Sieve – Searching For Virtual Hosts Among Non-Resolvable Domains

June 20, 2020

Searching for virtual hosts among non-resolvable domains.Installationgit clone https://github.com/dariusztytko/vhosts-sieve.gitpip3 install -r vhosts-sieve/requirements.txtUsageGet a list of subdomains (e.g. using Amass)$ amass...

Read MoreRead more about Vhosts-Sieve – Searching For Virtual Hosts Among Non-Resolvable Domains
osint
  • News

Malicious Google extensions research points out ‘unintended consequence’ of cloud computing

June 19, 2020

Researchers at Awake Security have made news over the past 24 hours exposing a scheme in which some 79 malicious...

Read MoreRead more about Malicious Google extensions research points out ‘unintended consequence’ of cloud computing
osint
  • News

Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?

June 19, 2020

“Two can play at this game…” Cybersecurity is a non-stop arms race between white hats and malicious hackers, and the...

Read MoreRead more about Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?
osint
  • News

Facial recognition: tech giants take a step back

June 19, 2020

Last week, a few major tech companies informed the public that they will not provide facial recognition software to law...

Read MoreRead more about Facial recognition: tech giants take a step back

Posts pagination

Previous 1 … 4,015 4,016 4,017 4,018 4,019 4,020 4,021 … 4,080 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 154[.]201[.]74[.]112:8443

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]120[.]13[.]85:8889

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 154[.]8[.]233[.]224:8081

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 119[.]91[.]246[.]70:443

May 18, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]200[.]183[.]130:88

May 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel