Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unraveling Ransomware Attacks: Strategies to Protect Your Digital World

May 9, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Cryptographic Protocols for Secure Communications

May 7, 2025
unlock_membership
  • Premium Members Content

Mastering Ethical Hacking and Penetration Testing for Cyber Defense

May 2, 2025
50036d6061ef3e0e5f82c4daedd66523
  • Premium Members Content
  • Try Hack Me

Try Hack Me: Fixit Splunk Walkthrough

April 25, 2025
unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

April 25, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
img_5a80cff5a1ab6
  • News

PrivateVPN Thoughts

February 11, 2018

PrivateVPN Does PrivateVPN keep any logs? The FAQ is emphatic: "No, we NEVER produce logs of any data traffic. The only things...

Read MoreRead more about PrivateVPN Thoughts
img_59eb41b4bdfd0
  • Tutorials

Ubiquiti Guest Wifi VLANS and PfSense

October 21, 2017

Ok, so you have upgraded your Wi-Fi to  a new shiney circular Ubiquiti device....and you are using PfSense too? Welcome...

Read MoreRead more about Ubiquiti Guest Wifi VLANS and PfSense
cyber-security-1805632_1280
  • Tutorials

Stapler v1 – VulnHub walkthrough

October 13, 2017

See attached PDF, i will migrate to a proper post when i can find time..... Stapler VM - Summary

Read MoreRead more about Stapler v1 – VulnHub walkthrough
locky
  • News

Locky ransomware back with a new bag of tricks

September 1, 2017

Locky ransomware is back, again... It's delivered with the help of new tricks to fool users and anti-malware defences. Delivered...

Read MoreRead more about Locky ransomware back with a new bag of tricks
binary-2175285_960_720
  • News

AI is key to speeding up threat detection and response

August 15, 2017

Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of...

Read MoreRead more about AI is key to speeding up threat detection and response
fe
  • News

Hackers Mock Cybersecurity Firm FireEye with Second Data Dump

August 14, 2017

The dump is relatively small, containing around 3MB of files. https://pastebin.com/L48e49AK At the end of July, anonymous hackers published documents stolen from...

Read MoreRead more about Hackers Mock Cybersecurity Firm FireEye with Second Data Dump
background-21657_1920
  • News

Fines of £17m for unprotected UK firms

August 14, 2017

The UK Government’s Department of Digital, Culture, Media and Sport (DCMS) has announced that firms could face fines of up...

Read MoreRead more about Fines of £17m for unprotected UK firms
spaghettiLOGO
  • News

Spaghetti – Web Application Security Scanner

August 11, 2017

Description Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations...

Read MoreRead more about Spaghetti – Web Application Security Scanner
2017-05-27 18_46_33-ACCESS DENIED - Blocked
  • Tutorials

Custom Access Denied Page – PfSense Squid Proxy

May 27, 2017

If like me you want to customise your Squid Proxy error page then , you have come to the correct...

Read MoreRead more about Custom Access Denied Page – PfSense Squid Proxy
Selection_016
  • Tutorials

HatCloud : Tool to uncover real IP address of servers using CloudFlare

March 20, 2017

HatCloud is built in Ruby. It allows you to discover the real IP address of a host that is being...

Read MoreRead more about HatCloud : Tool to uncover real IP address of servers using CloudFlare
2017-03-15 20_09_08-C__WINDOWS_system32_cmd.exe
  • News
  • Tutorials

PasswordStats – A cool new password reporting tool

March 15, 2017

Have you ever done a domain password audit? Well yes the cracking of the passwords can be fun depending on...

Read MoreRead more about PasswordStats – A cool new password reporting tool
2017-02-17 20_32_59-GoSecure
  • News

Malboxes: a Tool to Build Malware Analysis Virtual Machines

February 17, 2017

Malware analysis is like defusing bombs. The objective is to disassemble and understand a program that was built to do...

Read MoreRead more about Malboxes: a Tool to Build Malware Analysis Virtual Machines
icon-windows-logo
  • News

Windows SMB Zero-Day Exploit Released in the Wild after Microsoft delayed the Patch

February 6, 2017

Last weekend a security researcher publicly disclosed a zero-day vulnerability in Windows 10, Windows 8.1 and Server editions after Microsoft...

Read MoreRead more about Windows SMB Zero-Day Exploit Released in the Wild after Microsoft delayed the Patch
hacker
  • News

An Anonymous group just took down a fifth of the dark web

February 3, 2017

Visitors to more than 10,000 Tor-based websites were met with an alarming announcement this morning: “Hello, Freedom Hosting II, you...

Read MoreRead more about An Anonymous group just took down a fifth of the dark web
cisco
  • News

Cisco Prime Home: Hackers in your network?

February 3, 2017

As we connect more and more devices to the internet, we create more and more potential security vulnerabilities. While we’re...

Read MoreRead more about Cisco Prime Home: Hackers in your network?
2016-12-18 12_55_16- Status_ Dashboard
  • Tutorials

Snoopers Charter + PfSense + NordVPN Tutorial

December 18, 2016

So due to the UK government being dicks and forcing all UK ISPs for store logs for 1 year of...

Read MoreRead more about Snoopers Charter + PfSense + NordVPN Tutorial
_dsc8409
  • Product Review

Nuvio Power Bank Review

November 18, 2016

Portable Power Banks are a great way to stay connected when travelling, out and about or even just to give...

Read MoreRead more about Nuvio Power Bank Review
selection_056
  • News

Three Mobile Data Breach

November 18, 2016

Customer information from more than 130,000 users of the Three mobile network has been compromised in a cyber security breach,...

Read MoreRead more about Three Mobile Data Breach
may
  • News

UK Snoopers Charter 2 passed

November 18, 2016

Well that's not good, not good at all. The new bill will force internet companies to store their users’ browsing data...

Read MoreRead more about UK Snoopers Charter 2 passed
selection_053
  • Tutorials

How to delete multiple Google Calendar events

November 16, 2016

IF like me you have moved from one service to another over the years, you have probably exported a calendar...

Read MoreRead more about How to delete multiple Google Calendar events
20161104_101347
  • News

BlackHat Europe 2016: Day 2 of 2

November 4, 2016

Day 2 at Blackhat EU 2016 and had a great day. This talk Breaking Big Data: Evading Analysis of the...

Read MoreRead more about BlackHat Europe 2016: Day 2 of 2
img-20161103-wa0004
  • News

BlackHat Europe 2016: Day 1 of 2

November 3, 2016

Today was day 1 of 2 for me at BlackHat Europe 2016, one of my highlights was the tool Bloodhound ...

Read MoreRead more about BlackHat Europe 2016: Day 1 of 2
selection_047
  • News

Shadow Brokers leak list of hacked NSA Servers

October 31, 2016

The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked a portion of the NSA’s hacking...

Read MoreRead more about Shadow Brokers leak list of hacked NSA Servers
screenshot-2
  • Tutorials

How to Recove Data from a bit-lockered drive that is dying

October 30, 2016

So today i go home and fired up the Windows 10 PC with all of my drives Bitlockered. Long story...

Read MoreRead more about How to Recove Data from a bit-lockered drive that is dying

Posts pagination

Previous 1 … 4,062 4,063 4,064 4,065 4,066 4,067 4,068 … 4,070 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025
fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 8[.]219[.]163[.]113:443

May 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]120[.]45[.]216:9009

May 12, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]156[.]57[.]179:80

May 12, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel