Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unlocking Data Encryption: The Key to Secure Digital Communication

May 14, 2025
unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
ecosystem_
  • News

WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

January 23, 2020

In the early days, practically all tech support scammers would get their own leads by doing some amateur SEO poisoning...

Read MoreRead more about WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation
14
  • News

Cyber Attack Alert! A Fake Factory Network Attacked With RAT, Ransomware, Malware and So On!

January 23, 2020

Researchers simulated a real-looking “Industrial prototyping” organization with fake employees, PLCs, and websites to study the types of cyber-attacks that...

Read MoreRead more about Cyber Attack Alert! A Fake Factory Network Attacked With RAT, Ransomware, Malware and So On!
yara-logo
  • News

YARASAFE – Automatic Binary Function Similarity Checks with Yara

January 23, 2020

SAFE is a tool developed to create Binary Functions Embedding developed by Massarelli L., Di Luna G.A., Petroni F., Querzoni...

Read MoreRead more about YARASAFE – Automatic Binary Function Similarity Checks with Yara
AlertResponder_1
  • News

AlertResponder – Automatic Security Alert Response Framework By AWS Serverless Application Model

January 23, 2020

AlertResponder is a serverless framework for automatic response of security alert.OverviewAlertResponder receives an alert that is event of interest from...

Read MoreRead more about AlertResponder – Automatic Security Alert Response Framework By AWS Serverless Application Model
vulnerability-management-cloud-aws-rapid7
  • News

Vulnerability Management in the Cloud: Addressing the AWS Shared Responsibility Model

January 23, 2020

If you’re operating in the cloud, you may be familiar with the shared responsibility model. We often hear people say...

Read MoreRead more about Vulnerability Management in the Cloud: Addressing the AWS Shared Responsibility Model
cyber-4610993_1280
  • News

More than half of Russian companies are concerned about the protection of personal data of employees and customers

January 22, 2020

The antivirus company ESET studied the state of information security in the Russian business sector, interviewing dozens of IT Directors...

Read MoreRead more about More than half of Russian companies are concerned about the protection of personal data of employees and customers
tas_1_generic-keylogger
  • News

TAS – A Tiny Framework For Easily Manipulate The Tty And Create Fake Binaries

January 22, 2020

A tiny framework for easily manipulate the tty and create fake binaries.How it works?The framework has three main functions, tas_execv,...

Read MoreRead more about TAS – A Tiny Framework For Easily Manipulate The Tty And Create Fake Binaries
Corsy_4
  • News

Corsy v1.0 – CORS Misconfiguration Scanner

January 22, 2020

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations.RequirementsCorsy only works with Python 3 and...

Read MoreRead more about Corsy v1.0 – CORS Misconfiguration Scanner
collaboration-vulnerability-remediation-security-it-devops-teams-rapid7
  • News

Better Together: How to Collaborate to Drive Vulnerability Remediation Among Security, IT, and DevOps Teams

January 22, 2020

If you feel anxious about the amount of time it takes your organization to remediate vulnerabilities or find yourself spending...

Read MoreRead more about Better Together: How to Collaborate to Drive Vulnerability Remediation Among Security, IT, and DevOps Teams
osint
  • News

A week in security (January 13 – 19)

January 21, 2020

Last week on Malwarebytes Labs, we taught you how to prevent a rootkit attack, explained what data enrichment means, informed...

Read MoreRead more about A week in security (January 13 – 19)
crime-4512294_960_720
  • News

Railway Protection Force (RPF) bust a multi-crore ticket fraud

January 21, 2020

Bengaluru: The Railway Protection Force busted a multi crore ticket booking fraud and apprehended two miscreants who hacked the railway...

Read MoreRead more about Railway Protection Force (RPF) bust a multi-crore ticket fraud
Google-Maps-Data
  • News

Google Maps…Creepy or Useful?

January 21, 2020

Whether Android or iPhone there is no denying that Google is there for all of us, keeping a track log...

Read MoreRead more about Google Maps…Creepy or Useful?
macbook-3777665_1280
  • News

Bot List Containing Telnet Credentials for More than 500,000 Servers, Routers and IoT Devices Leaked Online

January 21, 2020

This week, a hacker published a list on a popular hacking forum containing Telnet credentials for over 515,000 servers, home...

Read MoreRead more about Bot List Containing Telnet Credentials for More than 500,000 Servers, Routers and IoT Devices Leaked Online
13
  • News

Website Puts 12 Billion User Records Up For Sale and Gets Seized By US Authorities

January 21, 2020

Are you fond of buying stolen'/leaked data? Because, one such domain, named ‘WeLeakInfo.com’ recently got seized by the US authorities....

Read MoreRead more about Website Puts 12 Billion User Records Up For Sale and Gets Seized By US Authorities
TeleGram-Scraper_1_20191203_205322
  • News

TeleGram-Scraper – Telegram Group Scraper Tool (Fetch All Information About Group Members)

January 21, 2020

Telegram Group Scraper Tool. Fetch All Information About Group Members• How To Install & Setup API ( Termux )• API...

Read MoreRead more about TeleGram-Scraper – Telegram Group Scraper Tool (Fetch All Information About Group Members)
Grouper2_1_G2-banner
  • News

Grouper2 – Find Vulnerabilities In AD Group Policy

January 21, 2020

What is it for?Grouper2 is a tool for pentesters to help find security-related misconfigurations in Active Directory Group Policy.It might...

Read MoreRead more about Grouper2 – Find Vulnerabilities In AD Group Policy
computer-1591018_1280
  • News

Ukrainian government job site posted passport scans of thousands of civil service candidates

January 20, 2020

Government job site https://career.gov.ua/ published scans of passports and other documents of citizens who registered on the portal to search...

Read MoreRead more about Ukrainian government job site posted passport scans of thousands of civil service candidates
gophish_1
  • News

Gophish – Open-Source Phishing Toolkit

January 20, 2020

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily...

Read MoreRead more about Gophish – Open-Source Phishing Toolkit
Aaia_2_AWS_IAM_Graph
  • News

Aaia – AWS Identity And Access Management Visualizer And Anomaly Finder

January 20, 2020

Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of...

Read MoreRead more about Aaia – AWS Identity And Access Management Visualizer And Anomaly Finder
tminstruction-1
  • Tutorials

Reverse Engineering a Philips TriMedia CPU based IP Camera – Part 3

January 19, 2020

Introduction Welcome to the final chapter of the Trimedia series. In the first part of the series, I introduced this...

Read MoreRead more about Reverse Engineering a Philips TriMedia CPU based IP Camera – Part 3
script_before
  • Tutorials

A Deep Dive Into Samsung’s TrustZone (Part 2)

January 19, 2020

Introduction After detailing Samsung's TrustZone implementation in the first part of this series, this blog post introduces the tools that...

Read MoreRead more about A Deep Dive Into Samsung’s TrustZone (Part 2)
hypervisor-based_arch
  • Tutorials

A Deep Dive Into Samsung’s TrustZone (Part 1)

January 19, 2020

Motivations After a general introduction on the ARM TrustZone and a focus on Qualcomm's implementation, this new series of articles...

Read MoreRead more about A Deep Dive Into Samsung’s TrustZone (Part 1)
packed_file
  • Tutorials

A Glimpse Into Tencent’s Legu Packer

January 19, 2020

Introduction This blog post deals with the Legu packer, an Android protector developed by Tencent that is currently one of...

Read MoreRead more about A Glimpse Into Tencent’s Legu Packer
irma
  • Tutorials

Irma Past and Future

January 19, 2020

Introduction Irma is our file security analysis software, originally developed as an open source project with the sponsorship of 5...

Read MoreRead more about Irma Past and Future

Posts pagination

Previous 1 … 4,054 4,055 4,056 4,057 4,058 4,059 4,060 … 4,076 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 106[.]53[.]191[.]52:80

May 15, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Royal Chemical

May 14, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Grafton Technologies

May 14, 2025
image
  • Data Breach
  • Ransomware

[PLAY] – Ransomware Victim: Regal Ideas

May 14, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Av Alumitran

May 14, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel