Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Lock and Code S1Ep13: Monitoring the safety of parental monitoring apps with Emory Roane

August 18, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep13: Monitoring the safety of parental monitoring apps with Emory Roane
osint
  • Vulnerabilities

New Release: UFONet v1.6 – “M4RAuD3R!”…

August 18, 2020

Posted by psy on Aug 17Hi Community, I am glad to present a new release of this tool: - https://ufonet.03c8.net...

Read MoreRead more about <div>New Release: UFONet v1.6 – “M4RAuD3R!”…</div>
osint
  • Vulnerabilities

Two vulnerabilities found in MikroTik’s RouterOS

August 18, 2020

Posted by Q C on Aug 14Advisory: two vulnerabilities found in MikroTik's RouterOS Details ======= Product: MikroTik's RouterOS Vendor URL:...

Read MoreRead more about <div>Two vulnerabilities found in MikroTik’s RouterOS</div>
osint
  • Vulnerabilities

Avian JVM vm::arrayCopy() silent return on negative length

August 18, 2020

Posted by Pietro Oliva via Fulldisclosure on Aug 11Vulnerability title: Avian JVM vm::arrayCopy() silent return on negative length Author: Pietro...

Read MoreRead more about Avian JVM vm::arrayCopy() silent return on negative length
osint
  • Vulnerabilities

Avian JVM vm::arrayCopy() Multiple Integer Overflows

August 18, 2020

Posted by Pietro Oliva via Fulldisclosure on Aug 11Vulnerability title: Avian JVM vm::arrayCopy() Multiple Integer Overflows Author: Pietro Oliva CVE:...

Read MoreRead more about Avian JVM vm::arrayCopy() Multiple Integer Overflows
osint
  • Vulnerabilities

SugarCRM < 10.1.0 (Reports Export) SQL Injection Vulnerability

August 18, 2020

Posted by Egidio Romano on Aug 11SugarCRM < 10.1.0 (Reports Export) SQL Injection Vulnerability *• Software Link:*https://www.sugarcrm.com *• Affected Versions:*...

Read MoreRead more about <div>SugarCRM < 10.1.0 (Reports Export) SQL Injection Vulnerability</div>
IMG_2301
  • News

Smart TVs can be used by hackers to spy on you

August 18, 2020

Arseniy Shcheltsin, CEO of Russian company Digital Platforms, said in an interview that modern TVs with Smart TV function are...

Read MoreRead more about Smart TVs can be used by hackers to spy on you
pexels-photo-1072851
  • News

For Privacy and Safety, Disable these features from your Google Assistance

August 18, 2020

It's difficult to imagine life without Google and every day the search engine gets more involved and intricate in our...

Read MoreRead more about For Privacy and Safety, Disable these features from your Google Assistance
IoT-PT_2_IoT-PT2528w2529
  • News

IoT-PT – A Virtual Environment For Pentesting IoT Devices

August 18, 2020

A new pentesting virtual environment for IoT DevicesDownload Link : https://drive.google.com/open?id=1XwGqkLax2irSPpwEpeAqypl9vEywzw3DMD5 : d9c20057b14cfa3fb25f744813b828df ; SHA1: 8828d693dc6c809377bab40d2bc26f525685e287OS info and RequirementsBase OS...

Read MoreRead more about IoT-PT – A Virtual Environment For Pentesting IoT Devices
urlbuster
  • News

Urlbuster – Powerful Mutable Web Directory Fuzzer To Bruteforce Existing And/Or Hidden Files Or Directories

August 18, 2020

Powerful web directory fuzzer to locate existing and/or hidden files or directories.Similar to dirb or gobuster, but with a lot...

Read MoreRead more about Urlbuster – Powerful Mutable Web Directory Fuzzer To Bruteforce Existing And/Or Hidden Files Or Directories
Stop-Attackers-in-Their-Tracks-with-Insight-Agent-Quarantine2
  • News

Stop Attackers in Their Tracks with Insight Agent Quarantine

August 18, 2020

Block the spread of malware and prevent lateral movement with Rapid7 Insight Agent Quarantine from InsightConnectRapid7’s Insight Agent is lightweight...

Read MoreRead more about Stop Attackers in Their Tracks with Insight Agent Quarantine
cyber-security-4785679_960_720
  • News

Emotet Malware Returned with Massive Malspam Campaign

August 17, 2020

The Emotet authors are popular for capitalizing on trending events and holidays by disseminating customized templates in form of Christmas...

Read MoreRead more about Emotet Malware Returned with Massive Malspam Campaign
osint
  • News

Facebook Struggles Against Hate Speech and Misinformation, Fails to Take Actions

August 17, 2020

In the last month, FB CEO Mark Zuckerberg and others met with civil rights activists to discuss FB's way of...

Read MoreRead more about Facebook Struggles Against Hate Speech and Misinformation, Fails to Take Actions
PowerSharpPack_1_Example
  • News

PowerSharpPack – Many usefull offensive CSharp Projects wraped into Powershell for easy usage

August 17, 2020

Many usefull offensive CSharp Projects wraped into Powershell for easy usage.Why? In my personal opinion offensive Powershell is not dead...

Read MoreRead more about PowerSharpPack – Many usefull offensive CSharp Projects wraped into Powershell for easy usage
spybrowse_4_img4
  • News

Spybrowse – Code Developed To Steal Certain Browser Config Files (History, Preferences, Etc)

August 17, 2020

Be sure to change the ftp variables throughout the code, these variables contain the username, password, & IP address of...

Read MoreRead more about Spybrowse – Code Developed To Steal Certain Browser Config Files (History, Preferences, Etc)
hacker-1725256_1280
  • News

Group-IB has identified a group of hackers engaged in corporate espionage

August 16, 2020

The hacker group RedCurl hacked companies around the world and stole corporate documents. The damage from its activities can amount...

Read MoreRead more about Group-IB has identified a group of hackers engaged in corporate espionage
osint
  • News

Indian Prime Minister Announces a New Cyber Security Policy for the Country

August 16, 2020

On the celebration of India's 74th Independence Day, the Prime Minister of India Narendra Modi announced his plans about bring...

Read MoreRead more about Indian Prime Minister Announces a New Cyber Security Policy for the Country
pexels-photo-238480-1
  • News

Facebook is testing Instagrams’ new messaging app, Threads with Automated Data Sharing

August 16, 2020

Facebook's team is working on a companion app for Instagram, called "Threads", which will automatically share your location, battery, a...

Read MoreRead more about Facebook is testing Instagrams’ new messaging app, Threads with Automated Data Sharing
CheckXSS_1
  • News

CheckXSS – Detect XSS vulnerability in Web Applications

August 16, 2020

Detect XSS vulnerability in Web ApplicationsScreenshotsEasy InstallationAs simple as below, Just one line of code:curl -L -s https://raw.githubusercontent.com/Jewel591/CheckXSS/master/docs/install.sh|bashUsage Instructionspython3.6 checkxss.py...

Read MoreRead more about CheckXSS – Detect XSS vulnerability in Web Applications
Phirautee_1
  • News

Phirautee – A PoC Crypto Virus To Spread User Awareness About Attacks And Implications Of Ransomwares

August 16, 2020

A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely...

Read MoreRead more about Phirautee – A PoC Crypto Virus To Spread User Awareness About Attacks And Implications Of Ransomwares
osint
  • News

Explosive technology and 3D printers: a history of deadly devices

August 15, 2020

Hackers: They’ll turn your computer into a BOMB! “Hackers turning computers into bombs” is a now legendary headline, taken from...

Read MoreRead more about Explosive technology and 3D printers: a history of deadly devices
osint
  • News

Russian Hackers Use Linux Malware Drovorub, NSA and FBI Finds Out

August 15, 2020

The NSA and FBI released a joint report today, which told about a new kind of Linux malware. According to...

Read MoreRead more about Russian Hackers Use Linux Malware Drovorub, NSA and FBI Finds Out
unfollow-plus_2_unfollow-plus
  • News

Unfollow-Plus – Automated Instagram Unfollower Bot

August 15, 2020

Automated Instagram Unfollower Bot.Installation :apt updateapt install git curl -ygit clone git://github.com/htr-tech/unfollow-plus.gitcd unfollow-plus> Run : bash unfollower.shSingle Command :apt update...

Read MoreRead more about Unfollow-Plus – Automated Instagram Unfollower Bot
dagobah_1_dagobah-dashboard
  • News

DAGOBAH – Open Source Tool To Generate Internal Threat Intelligence, Inventory & Compliance Data From AWS Resources

August 15, 2020

Dagobah is an open source tool written in python to automate the internal threat intelligence generation, inventory collection and compliance...

Read MoreRead more about DAGOBAH – Open Source Tool To Generate Internal Threat Intelligence, Inventory & Compliance Data From AWS Resources

Posts pagination

Previous 1 … 4,089 4,090 4,091 4,092 4,093 4,094 4,095 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel