Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Security Assessment and Testing for Robust Cyber Defense

June 25, 2025
unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
go
  • News

Sploit – Go Package That Aids In Binary Analysis And Exploitation

December 21, 2020

Sploit is a Go package that aids in binary analysis and exploitation. The motivating factor behind the development of sploit...

Read MoreRead more about Sploit – Go Package That Aids In Binary Analysis And Exploitation
fawkes_3_img
  • News

Fawkes – Tool To Search For Targets Vulnerable To SQL Injection (Performs The Search Using Google Search Engine)

December 21, 2020

Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.Options -q,...

Read MoreRead more about Fawkes – Tool To Search For Targets Vulnerable To SQL Injection (Performs The Search Using Google Search Engine)
osint
  • News

COVID-19 themed attacks December 6 – December 19, 2020

December 20, 2020

This post includes the details of the COVID-19 themed attacks launched from December 6 – December 19, 2020. December 6...

Read MoreRead more about COVID-19 themed attacks December 6 – December 19, 2020
osint
  • News

NATO is checking its systems to determine the impact of SolarWinds hack

December 20, 2020

NATO announced it is assessing its systems after the SolarWinds supply chain attack that impacted multiple US government agencies. NATO...

Read MoreRead more about NATO is checking its systems to determine the impact of SolarWinds hack
american-flag-793891_960_720
  • News

What is “Sunburst”? A look into the Most Serious Cyberattack in American History

December 20, 2020

 A number of organisations have been attacked by what has been chronicled as one of the most severe acts of...

Read MoreRead more about What is “Sunburst”? A look into the Most Serious Cyberattack in American History
pexels-photo-5380605
  • News

UK Finance Body: Beware of Parcel Delivery Scam, Especially During Christmas Season

December 20, 2020

  After months of lockdown, this Christmas season has become even more special to people but fraudsters are also beginning...

Read MoreRead more about UK Finance Body: Beware of Parcel Delivery Scam, Especially During Christmas Season
security-4851426_960_720
  • News

Active Cypher: “Great Deal of Orchestration of Our Intelligence in AI into Existing Systems”

December 20, 2020

  Active Cypher: The company is built upon a socially responsible fabric, that provides information security for individuals and corporations...

Read MoreRead more about Active Cypher: “Great Deal of Orchestration of Our Intelligence in AI into Existing Systems”
h
  • News

Bheem – Simple Collection Of Small Bash-Scripts Which Runs Iteratively To Carry Out Various Tools And Recon Process

December 20, 2020

Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process...

Read MoreRead more about Bheem – Simple Collection Of Small Bash-Scripts Which Runs Iteratively To Carry Out Various Tools And Recon Process
bento_1
  • News

Bento – A Minimal Fedora-Based Container For Penetration Tests And CTF With The Sweet Addition Of GUI Applications

December 20, 2020

A bento (弁当, bentō) is a single-portion take-out or home-packed meal of Japanese origin. Bento Toolkit is a simple and...

Read MoreRead more about Bento – A Minimal Fedora-Based Container For Penetration Tests And CTF With The Sweet Addition Of GUI Applications
osint
  • News

NSA warns of cloud attacks on authentication mechanisms

December 19, 2020

The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks...

Read MoreRead more about NSA warns of cloud attacks on authentication mechanisms
osint
  • News

FBI and Interpol shut down some servers of Joker’s Stash carding marketplace

December 19, 2020

Joker’s Stash, the largest carding marketplace online, was shut down by a coordinated operation conducted by the FBI and the...

Read MoreRead more about FBI and Interpol shut down some servers of Joker’s Stash carding marketplace
osint
  • News

Hackers target COVID-19 vaccine supply chain and sell the vaccine in Darkweb

December 19, 2020

Threat actors continue to trade critical medical data in the Dark Web while organizations are involved in the response to the COVID-19 pandemic. Cybercrime organizations...

Read MoreRead more about Hackers target COVID-19 vaccine supply chain and sell the vaccine in Darkweb
vpnMentor-visitor-list-600x366-1
  • News

The many ways you can be scammed on Facebook, part II

December 19, 2020

In part 1 of this article series, we looked at data mining schemes, scam ad campaigns, concert tickets scams, and...

Read MoreRead more about The many ways you can be scammed on Facebook, part II
internet-3113279_1280
  • News

The European Commission added VKontakte and Telegram to the list of pirate sites

December 19, 2020

VKontakte is surprised by the decision of the European Commission to include the social network in the list of resources...

Read MoreRead more about The European Commission added VKontakte and Telegram to the list of pirate sites
osint
  • News

Massive Cyberattack On US Government Exposes Shortcomings, Russia Named Top Suspect

December 19, 2020

Not long ago, US agencies had confirmed a massive data breach that compromised their networks. The problem persists, and US...

Read MoreRead more about Massive Cyberattack On US Government Exposes Shortcomings, Russia Named Top Suspect
vladimir-putin-2374090_1280
  • News

Putin: the US State Department and the US intelligence agencies come up with fake about Russian hackers

December 19, 2020

According to the Russian President, he is counting on the experience of the President-elect of the United States, which will...

Read MoreRead more about Putin: the US State Department and the US intelligence agencies come up with fake about Russian hackers
abstract_digital_sunburst-990x400-1
  • News

Sunburst: connecting the dots in the DNS requests

December 19, 2020

On December 13, 2020 FireEye published important details of a newly discovered supply chain attack. An unknown attacker, referred to...

Read MoreRead more about Sunburst: connecting the dots in the DNS requests
abstract_cyberspace_global_data-990x400-1
  • News

The future of cyberconflicts

December 19, 2020

The ever-increasing role of technology in every aspect of our society has turned cybersecurity into a major sovereignty issue for...

Read MoreRead more about The future of cyberconflicts
scilla_9_scilla
  • News

Scilla – Information Gathering Tool (DNS/Subdomain/Port Enumeration)

December 19, 2020

Information Gathering Tool - Dns/Subdomain/Port EnumerationInstallationFirst of all, clone the repo locally git clone https://github.com/edoardottt/scilla.git Scilla has external dependencies, so...

Read MoreRead more about Scilla – Information Gathering Tool (DNS/Subdomain/Port Enumeration)
Office365
  • News

Go365 – An Office365 User Attack Tool

December 19, 2020

Go365 is a tool designed to perform user enumeration* and password guessing attacks on organizations that use Office365 (now/soon Microsoft365)....

Read MoreRead more about Go365 – An Office365 User Attack Tool
osint
  • Vulnerabilities

Defense in depth — the Microsoft way (part 68): where compatibility means vulnerability

December 18, 2020

Posted by Stefan Kanthak on Dec 18Hi @ll, this post is a shortened version of <https://skanthak.homepage.t-online.de/detour.html> With Windows 2000 and...

Read MoreRead more about Defense in depth — the Microsoft way (part 68): where compatibility means vulnerability
osint
  • Vulnerabilities

Rocket.Chat quietly patches XSS vulnerability

December 18, 2020

Posted by Moe Szyslak on Dec 18Rocket.Chat has quietly fixed a stored XSS vulnerability in the following commits:https://github.com/RocketChat/Rocket.Chat/commit/96d3155245ec65f681664b48b6dafc94c1ea021chttps://github.com/RocketChat/Rocket.Chat/commit/43fe12d775b2329e780a1369a1b2c25070cdcab9 Exploitation of...

Read MoreRead more about Rocket.Chat quietly patches XSS vulnerability
osint
  • Vulnerabilities

CA20201215-01: Security Notice for CA Service Catalog

December 18, 2020

Posted by Kevin Kotas via Fulldisclosure on Dec 18CA20201215-01: Security Notice for CA Service Catalog Issued: December 15, 2020 Last...

Read MoreRead more about CA20201215-01: Security Notice for CA Service Catalog
osint
  • Vulnerabilities

Programi Bilanc – Build 007 Release 014 31.01.2020 – Software-update packages are downloaded via unencrypted HTTP [CVE-2020-11718]

December 18, 2020

Posted by Georg Ph E Heise via Fulldisclosure on Dec 18Programi Bilanc - Build 007 Release 014 31.01.2020 - Software-update...

Read MoreRead more about Programi Bilanc – Build 007 Release 014 31.01.2020 – Software-update packages are downloaded via unencrypted HTTP [CVE-2020-11718]

Posts pagination

Previous 1 … 4,053 4,054 4,055 4,056 4,057 4,058 4,059 … 4,177 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

HIBP-Banner-1
  • Data Breach

Robinsons Malls – 195,597 breached accounts

June 26, 2025
HIBP-Banner-1
  • Data Breach

Have Fun Teaching – 27,126 breached accounts

June 26, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Habitat for Humanity of Greater Sioux Falls, Inc[.]

June 26, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]133[.]41[.]106:80

June 26, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 140[.]143[.]132[.]170:80

June 26, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel