Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Awareness Training to Protect Your Business

May 16, 2025
unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract_blur_code-990x400-1
  • News

Cycldek: Bridging the (air) gap

June 4, 2020

Key findings While investigating attacks related to a group named Cycldek post 2018, we were able to uncover various pieces...

Read MoreRead more about Cycldek: Bridging the (air) gap
children_report_featured-990x400-1
  • News

Kids on the Web in 2020

June 4, 2020

Technology is what is saving us from a complete change in the way of life in a world of a...

Read MoreRead more about Kids on the Web in 2020
eviloffice_1
  • News

Eviloffice – Inject Macro And DDE Code Into Excel And Word Documents (Reverse Shell)

June 4, 2020

Win python script to inject Macro and DDE code into Excel and Word documents (reverse shell)Features:Inject malicious Macro on formats:...

Read MoreRead more about Eviloffice – Inject Macro And DDE Code Into Excel And Word Documents (Reverse Shell)
ligolo_3_ligolo
  • News

Ligolo – Reverse Tunneling Made Easy For Pentesters, By Pentesters

June 4, 2020

Ligolo is a simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection in complete safety...

Read MoreRead more about Ligolo – Reverse Tunneling Made Easy For Pentesters, By Pentesters
Custom-Policy-Builder-Is-Now-in-Open-Preview-in-InsightVM2
  • News

Custom Policy Builder Is Now in Open Preview in InsightVM

June 4, 2020

This post is part one of a two-part blog series on policy customization in InsightVM.To properly guard against security threats,...

Read MoreRead more about Custom Policy Builder Is Now in Open Preview in InsightVM
background2
  • News

Standing Together: A Public Statement from Rapid7 CEO Corey Thomas

June 4, 2020

It has been shocking for many people in the United States and around the world to see the stark racial...

Read MoreRead more about Standing Together: A Public Statement from Rapid7 CEO Corey Thomas
covid-hero-bg-1
  • News

Rapid7 Quarterly Threat Report: 2020 Q1

June 4, 2020

If calendars still hold any meaning for you, you may be dimly aware that it's now midway through the second...

Read MoreRead more about Rapid7 Quarterly Threat Report: 2020 Q1
cyber
  • News

Provider Volia reported to the cyber police about the intense cyberattacks on the server

June 3, 2020

Cable provider Volia appealed to the Cyber Police on the fact of fixing a DDoS attack on the Kharkov servers...

Read MoreRead more about Provider Volia reported to the cyber police about the intense cyberattacks on the server
inshackle_1
  • News

Inshackle – Instagram Hacks: Track Unfollowers, Increase Your Followers, Download Stories, Etc

June 3, 2020

Instagram hacks: Track unfollowers, Increase your followers, Download Stories, etcFeatures:Unfollow TrackerIncrease FollowersDownload: Stories, Saved Content, Following/followers list, Profile InfoUnfollow all...

Read MoreRead more about Inshackle – Instagram Hacks: Track Unfollowers, Increase Your Followers, Download Stories, Etc
GhostShell_12_generating252520shellcode
  • News

GhostShell – Malware Indetectable, With AV Bypass Techniques, Anti-Disassembly, And More

June 3, 2020

In this malware, are used some techniques to try bypass the AVs, VMs, and Sandboxes, with only porpuse to learning...

Read MoreRead more about GhostShell – Malware Indetectable, With AV Bypass Techniques, Anti-Disassembly, And More
osint
  • News

Multilingual malware attacks on industrial sector suppliers designed to thwart detection

June 2, 2020

International equipment and software suppliers for the industrial sector last May suffered targeted malware attacks that employed numerous unconventional techniques to evade detection,...

Read MoreRead more about Multilingual malware attacks on industrial sector suppliers designed to thwart detection
osint
  • News

Malware in GitHub-hosted projects designed to spread among open-source developers

June 2, 2020

Twenty-six open-source projects hosted on GitHub repositories were found to be infected with malware and capable of serving up weaponized...

Read MoreRead more about Malware in GitHub-hosted projects designed to spread among open-source developers
osint
  • News

Coronavirus campaigns lead to surge in malware threats, Labs report finds

June 2, 2020

In the first three months of 2020, as the world clamped down to limit coronavirus, cyber threats ramped up. Our...

Read MoreRead more about Coronavirus campaigns lead to surge in malware threats, Labs report finds
osint
  • News

A week in security (May 25 – 31)

June 2, 2020

Last week on Malwarebytes Labs, we published our most recent episode of our podcast Lock and Code, providing an in-depth...

Read MoreRead more about A week in security (May 25 – 31)
computer
  • News

Germany threatened Russia with sanctions for a hacker attack on the Bundestag

June 2, 2020

German Foreign Ministry spokeswoman Maria Adebar on Friday confirmed that Germany in connection with the case of a hacker attack...

Read MoreRead more about Germany threatened Russia with sanctions for a hacker attack on the Bundestag
iphone2B5
  • News

Apple Plans to Expand Cloud-Based Services, Enters Cloud Computing Space

June 2, 2020

Apple is planning to invest more in streamlines and increasing its cloud-based and software services like iCloud, Newsplus, and Apple...

Read MoreRead more about Apple Plans to Expand Cloud-Based Services, Enters Cloud Computing Space
web-3706562_960_7202B252812529
  • News

Is Data Science loosing all that hype?

June 2, 2020

All over the world companies are making cuts, the COVID-19 has lead to a major economic downfall, and companies are...

Read MoreRead more about Is Data Science loosing all that hype?
Forerunner
  • News

Forerunner – Fast And Extensible Network Scanning Library Featuring Multithreading, Ping Probing, And Scan Fetchers

June 2, 2020

The Forerunner library is a fast, lightweight, and extensible networking library created to aid in the development of robust network...

Read MoreRead more about Forerunner – Fast And Extensible Network Scanning Library Featuring Multithreading, Ping Probing, And Scan Fetchers
enumy
  • News

Enumy – Linux Post Exploitation Privilege Escalation Enumeration

June 2, 2020

Enumy is portable executable that you drop on target Linux machine during a pentest or CTF in the post exploitation...

Read MoreRead more about Enumy – Linux Post Exploitation Privilege Escalation Enumeration
cisa-logo-002
  • News

A Series Of Cyber Essentials Toolkits Released To Address Cyber-Security Risks

June 1, 2020

As a major starting point for small businesses and government agencies to comprehend and address cybersecurity risk as they indulge...

Read MoreRead more about A Series Of Cyber Essentials Toolkits Released To Address Cyber-Security Risks
jackpotting
  • News

Github Escapes from Octopus Malware that Affected its 26 Software Projects

June 1, 2020

Github, a platform where every malicious software report is equally different in its place, manages to escape from a malware...

Read MoreRead more about Github Escapes from Octopus Malware that Affected its 26 Software Projects
bing-ip2hosts_3
  • News

Bing-Ip2Hosts – Bingip2Hosts Is A Bing.com Web Scraper That Discovers Websites By IP Address

June 1, 2020

Bing-ip2hosts is a Bing.com web scraper to discover hostnames by IP address.DescriptionBing-ip2hosts is a Bing.com web scraper that discovers hostnames...

Read MoreRead more about Bing-Ip2Hosts – Bingip2Hosts Is A Bing.com Web Scraper That Discovers Websites By IP Address
vault
  • News

Vault – A Tool For Secrets Management, Encryption As A Service, And Privileged Access Management

June 1, 2020

Please note: We take Vault's security and our users' trust very seriously. If you believe you have found a security...

Read MoreRead more about Vault – A Tool For Secrets Management, Encryption As A Service, And Privileged Access Management
social-media-763731_1280
  • News

Religion Biased Algorithms Continue to Depict How Facebook Doesn’t Believe in Free Speech

May 31, 2020

Facebook's brand image has taken a critical hit long ago falling from the top ten global brands list, the brand...

Read MoreRead more about Religion Biased Algorithms Continue to Depict How Facebook Doesn’t Believe in Free Speech

Posts pagination

Previous 1 … 4,020 4,021 4,022 4,023 4,024 4,025 4,026 … 4,080 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: aplusmachining[.]com

May 17, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: overheadtyler[.]com

May 17, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: prais[.]ro

May 17, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: clarkmechanicalinc[.]com

May 17, 2025
image
  • Data Breach
  • Ransomware

[SAFEPAY] – Ransomware Victim: distribution2[.]com

May 17, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel