Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
VT
  • News

Inter skimming kit used in homoglyph attacks

August 7, 2020

As we continue to track web threats and credit card skimming in particular, we often rediscover techniques we’ve encountered elsewhere...

Read MoreRead more about Inter skimming kit used in homoglyph attacks
osint
  • News

ProctorU – 444,453 breached accounts

August 7, 2020

  In June 2020, the online exam service ProctorU suffered a data breach which was subsequently shared extensively across online...

Read MoreRead more about ProctorU – 444,453 breached accounts
fintech_abstract-990x400-1
  • News

Incident Response Analyst Report 2019

August 7, 2020

 Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility...

Read MoreRead more about Incident Response Analyst Report 2019
2020-08-07-ISC-diary-image-00a-1
  • News

TA551 (Shathak) Word docs push IcedID (Bokbot)

August 7, 2020

Introduction I've been tracking malicious Word documents from the TA551 (Shathak) campaign  This year, we've seen a lot of Valak...

Read MoreRead more about TA551 (Shathak) Word docs push IcedID (Bokbot)
osint
  • News

A Fork of the FTCode Powershell Ransomware, (Thu, Aug 6th)

August 7, 2020

Yesterday, I found a new malicious Powershell script that deserved to be analyzed due to the way it was dropped...

Read MoreRead more about A Fork of the FTCode Powershell Ransomware, (Thu, Aug 6th)
h92
  • News

Gtunnel – A Robust Tunelling Solution Written In Golang

August 7, 2020

A TCP tunneling suite built with golang and gRPC. gTunnel can manage multiple forward and reverse tunnels that are all...

Read MoreRead more about Gtunnel – A Robust Tunelling Solution Written In Golang
taowu-cobalt-strike_1_timg
  • News

Taowu – A CobaltStrike Toolkit

August 7, 2020

TaoWu(檮杌) is a CobaltStrike toolkit. All the scripts are gathered on the Internet and slightly modified by myself. You can...

Read MoreRead more about Taowu – A CobaltStrike Toolkit
vv-day-1-recap
  • News

Virtual Black Hat: Rapid7 Experts Share Key Takeaways from Day 1 Sessions

August 7, 2020

Boy, oh boy, has Black Hat changed. Where we once looked up at the neon lights of Las Vegas, we...

Read MoreRead more about Virtual Black Hat: Rapid7 Experts Share Key Takeaways from Day 1 Sessions
metasploit-ascii-1
  • News

Metasploit 6 Now Under Active Development

August 7, 2020

Today the Metasploit team is pleased to announce active development of Metasploit Framework 6.0, available now for testing and community...

Read MoreRead more about Metasploit 6 Now Under Active Development
osint
  • News

Data Accountability and Transparency Act of 2020 looks beyond consent

August 6, 2020

In the United States, data privacy is hard work—particularly for the American people. But one US Senator believes it shouldn’t...

Read MoreRead more about Data Accountability and Transparency Act of 2020 looks beyond consent
osint
  • News

Business email compromise: gunning for goal

August 6, 2020

The evergreen peril of business email compromise (BEC) finds itself in the news once more. This time, major English Premier...

Read MoreRead more about Business email compromise: gunning for goal
osint
  • News

Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks

August 6, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks
pexels-photo-238480
  • News

Here’s All you Need to Know About Instagram Reels; Launched Globally in Over 50 Countries

August 6, 2020

As TikTok fell prey to extensive criticism and was labeled as a 'threat to security' by governments, resulting in the...

Read MoreRead more about Here’s All you Need to Know About Instagram Reels; Launched Globally in Over 50 Countries
IMG_2124
  • News

The scale of data leaks of patients with coronavirus in Russia has become known

August 6, 2020

More than a third of all cases of leaks of personal data of patients with coronavirus, as well as suspected...

Read MoreRead more about The scale of data leaks of patients with coronavirus in Russia has become known
encryption
  • News

WastedLocker ransomware uses a sophisticated trick by abusing Windows features to avoid detection

August 6, 2020

WastedLocker has been in the highlights for a successful attack on wearable tech and smartwatch manufacturer Garmin and was paid...

Read MoreRead more about WastedLocker ransomware uses a sophisticated trick by abusing Windows features to avoid detection
UEFI_RETool_9_depend-graph
  • News

UEFI_RETool – A Tool For UEFI Firmware Reverse Engineering

August 6, 2020

A tool for UEFI firmware reverse engineering.UEFI firmware analysis with uefi_retool.py scriptUsage:Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins...

Read MoreRead more about UEFI_RETool – A Tool For UEFI Firmware Reverse Engineering
Netenum_4_screen
  • News

Netenum – A Tool To Passively Discover Active Hosts On A Network

August 6, 2020

Network reconnaisance tool that sniffs for active hostsIntroductionNetenum passively monitors the ARP traffic on the network. It extracts basic data...

Read MoreRead more about Netenum – A Tool To Passively Discover Active Hosts On A Network
election-4745282_960_720
  • News

Google Bans Hacked Political Content Ahead of the US Elections, Implements New Google Ads Policy

August 5, 2020

The presidential elections in the US are near. Keeping this in mind, Google has announced a new policy that will...

Read MoreRead more about Google Bans Hacked Political Content Ahead of the US Elections, Implements New Google Ads Policy
IMG_2119
  • News

Personal data of one million Moscow car owners were put up for sale on the Internet

August 5, 2020

On July 24, an archive with a database of motorists was put up for sale on one of the forums...

Read MoreRead more about Personal data of one million Moscow car owners were put up for sale on the Internet
DLInjector-GUI_1
  • News

DLInjector-GUI – DLL Injector Graphical User Interface

August 5, 2020

DLInjector for Graphical User Interface.Faster DLL Injector for processes. It targets the process name to identify the target. The process...

Read MoreRead more about DLInjector-GUI – DLL Injector Graphical User Interface
xeca_1_empire
  • News

Xeca – PowerShell Payload Generator

August 5, 2020

xeca is a project that creates encrypted PowerShell payloads for offensive purposes.Creating position independent shellcode from DLL files is also...

Read MoreRead more about Xeca – PowerShell Payload Generator
InsightIDR-Connects-to-Zoom-for-Easy-Monitoring-2
  • News

InsightIDR Now Connects to Zoom for Easy Monitoring

August 5, 2020

Zoom adoption has skyrocketed with spikes in remote working, but web application security needs to be a top priority to...

Read MoreRead more about InsightIDR Now Connects to Zoom for Easy Monitoring
graph
  • Tutorials

Why are Frida and QBDI a Great Blend on Android?

August 4, 2020

Introduction Reverse engineering of Android applications is usually considered as somewhat effortless because of the possibility of retrieving the Java...

Read MoreRead more about Why are Frida and QBDI a Great Blend on Android?
hackers
  • News

The Council of the EU and Its First-Ever Sanctions against Persons or Entities Involved in Various Cyber-Attacks

August 4, 2020

The Council of the European Union imposed its first-ever sanction against persons or entities engaged with different cyber-attacks focusing on...

Read MoreRead more about The Council of the EU and Its First-Ever Sanctions against Persons or Entities Involved in Various Cyber-Attacks

Posts pagination

Previous 1 … 4,092 4,093 4,094 4,095 4,096 4,097 4,098 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel