Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025
unlock_membership
  • Premium Members Content

Mastering Social Engineering Attacks How to Recognize and Prevent Them

May 23, 2025
unlock_membership
  • Premium Members Content

Firewall Technology Uncovered: Your Essential Guide to Network Security

May 21, 2025
Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
nk
  • News

North Korean hackers could start stealing business secrets

February 22, 2019

As North Korea tries to rev up its economy, it may shift its hacking efforts from financial thievery to stealing...

Read MoreRead more about North Korean hackers could start stealing business secrets
visa
  • News

Secret Rules of Visa and MasterCard Revealed by Russian Ex-Hacker

February 21, 2019

Dmitry Artimovich, who on several occasions had been referred to as a "Russian hacker” by the world's largest news publications...

Read MoreRead more about Secret Rules of Visa and MasterCard Revealed by Russian Ex-Hacker
dirtysock
  • News

dirty_sock: Linux Privilege Escalation (via snapd)

February 21, 2019

In January 2019, current versions of Ubuntu Linux were found to be vulnerable to local privilege escalation due to a...

Read MoreRead more about dirty_sock: Linux Privilege Escalation (via snapd)
drupal
  • News

CVE-2019-6340 | Drupal RCE Vulnerability

February 21, 2019

The remote execution flaw exists because some field types do not properly sanitize data from non-form sources and this can...

Read MoreRead more about CVE-2019-6340 | Drupal RCE Vulnerability
linux
  • News

CVE-2019-8912 | Use After Free Arbitrary Code Execution Vulnerability for many Linux Kernels

February 21, 2019

Linux Kernel is prone to an arbitrary code-execution vulnerability.An attacker can exploit this issue to execute arbitrary code in the...

Read MoreRead more about CVE-2019-8912 | Use After Free Arbitrary Code Execution Vulnerability for many Linux Kernels
hacker
  • News

Cybersecurity A Key Challenge for the Automotive Industry

February 21, 2019

The fundamental challenge of cybersecurity is not new. They have existed as long as computers have been used in sensitive applications in...

Read MoreRead more about Cybersecurity A Key Challenge for the Automotive Industry
sys
  • News

Monero Miner-Malware Uses RADMIN, MIMIKATZ to Infect, Propagate via SMB Vulnerability

February 20, 2019

Between the last week of January to February, we noticed an increase in hack tool installation attempts that dropped seemingly...

Read MoreRead more about Monero Miner-Malware Uses RADMIN, MIMIKATZ to Infect, Propagate via SMB Vulnerability
2019-02-20_08-11
  • News

GitHub Increases Bug Bounty Program Rewards

February 20, 2019

GitHub revealed on Tuesday that last year it paid out $165,000 to researchers who took part in its public bug...

Read MoreRead more about GitHub Increases Bug Bounty Program Rewards
kali-release
  • News

Kali Linux 2019.1 – Updates…updates….updates

February 19, 2019

Everyone likes a new Kali update!The big marquee update of this release is the update of Metasploit to version 5.0,...

Read MoreRead more about Kali Linux 2019.1 – Updates…updates….updates
crowdstrike-rankings
  • News

You have around 20 minutes to contain a Russian APT attack

February 19, 2019

Governments and private organisations have around 20 minutes to detect and contain a hack from Russian nation-state actors. New statistics...

Read MoreRead more about You have around 20 minutes to contain a Russian APT attack
2018-10-10 08_37_11-Adversary Simulation and Red Team Operations Software - Cobalt Strike
  • Tutorials

Cobalt Strike

October 10, 2018

Cobalt Strike is  software for Adversary Simulations and Red Team Operations. What this means is, if you wanted to test your...

Read MoreRead more about Cobalt Strike
Selection_012
  • Tutorials

Canary Tokens

October 9, 2018

TLDR: Canary tokens are not new but can help give you some Intel into your attackers, be it insider or...

Read MoreRead more about Canary Tokens
Selection_010
  • Tutorials

Kali Linux 2018.3 Increase TxPower

May 16, 2018

Increasing the TXpower above what is allowed in your country can be illegal. If you decide to make these changes...

Read MoreRead more about Kali Linux 2018.3 Increase TxPower
2018-04-24 21_32_56-
  • Tutorials

How to setup your Libre Elec / Kodi / Google Home Bluetooth / Yatse Android Remote

April 24, 2018

I have a number of Kodi Media Centre running in different rooms around the house. Some are hooked up to...

Read MoreRead more about How to setup your Libre Elec / Kodi / Google Home Bluetooth / Yatse Android Remote
oscp-certs
  • Tutorials

Another, Here is my OSCP story

April 15, 2018

So the OSCP journey is hard work, needs commitment, understanding from your wife and a try harder attitude (you will...

Read MoreRead more about Another, Here is my OSCP story
img_5a80cff5a1ab6
  • News

PrivateVPN Thoughts

February 11, 2018

PrivateVPN Does PrivateVPN keep any logs? The FAQ is emphatic: "No, we NEVER produce logs of any data traffic. The only things...

Read MoreRead more about PrivateVPN Thoughts
img_59eb41b4bdfd0
  • Tutorials

Ubiquiti Guest Wifi VLANS and PfSense

October 21, 2017

Ok, so you have upgraded your Wi-Fi to  a new shiney circular Ubiquiti device....and you are using PfSense too? Welcome...

Read MoreRead more about Ubiquiti Guest Wifi VLANS and PfSense
cyber-security-1805632_1280
  • Tutorials

Stapler v1 – VulnHub walkthrough

October 13, 2017

See attached PDF, i will migrate to a proper post when i can find time..... Stapler VM - Summary

Read MoreRead more about Stapler v1 – VulnHub walkthrough
locky
  • News

Locky ransomware back with a new bag of tricks

September 1, 2017

Locky ransomware is back, again... It's delivered with the help of new tricks to fool users and anti-malware defences. Delivered...

Read MoreRead more about Locky ransomware back with a new bag of tricks
binary-2175285_960_720
  • News

AI is key to speeding up threat detection and response

August 15, 2017

Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of...

Read MoreRead more about AI is key to speeding up threat detection and response
fe
  • News

Hackers Mock Cybersecurity Firm FireEye with Second Data Dump

August 14, 2017

The dump is relatively small, containing around 3MB of files. https://pastebin.com/L48e49AK At the end of July, anonymous hackers published documents stolen from...

Read MoreRead more about Hackers Mock Cybersecurity Firm FireEye with Second Data Dump
background-21657_1920
  • News

Fines of £17m for unprotected UK firms

August 14, 2017

The UK Government’s Department of Digital, Culture, Media and Sport (DCMS) has announced that firms could face fines of up...

Read MoreRead more about Fines of £17m for unprotected UK firms
spaghettiLOGO
  • News

Spaghetti – Web Application Security Scanner

August 11, 2017

Description Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations...

Read MoreRead more about Spaghetti – Web Application Security Scanner
2017-05-27 18_46_33-ACCESS DENIED - Blocked
  • Tutorials

Custom Access Denied Page – PfSense Squid Proxy

May 27, 2017

If like me you want to customise your Squid Proxy error page then , you have come to the correct...

Read MoreRead more about Custom Access Denied Page – PfSense Squid Proxy

Posts pagination

Previous 1 … 4,099 4,100 4,101 4,102 4,103 4,104 4,105 … 4,107 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5117

May 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5271

May 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5244

May 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-41649

May 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5270

May 28, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel