Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Virtual Private Networks for Enhanced Online Privacy

May 28, 2025
unlock_membership
  • Premium Members Content

Mastering Social Engineering Attacks How to Recognize and Prevent Them

May 23, 2025
unlock_membership
  • Premium Members Content

Firewall Technology Uncovered: Your Essential Guide to Network Security

May 21, 2025
Supporter_Plus_Banner
  • Premium Members Content

Inside Lumma Stealer – The Infostealer Fueling Cybercrime in 2025

May 19, 2025
unlock_membership
  • Premium Members Content

Mastering Digital Forensics and Incident Response for Cybersecurity

May 19, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
LetsEncrypt
  • Tutorials

How to use Lets Encrypt on Go Daddy’s Shared Hosting Platform

June 8, 2016

So your looking for a way to use a free lets encrypt cert on your shared godaddy host? Well this...

Read MoreRead more about How to use Lets Encrypt on Go Daddy’s Shared Hosting Platform
keyboard
  • News

OEM Laptops Bloatware allows Remote Code Execution

May 31, 2016

Laptops from Dell, HP, Asus, Acer and Lenovo all had at least one vulnerability that could result in complete compromise...

Read MoreRead more about OEM Laptops Bloatware allows Remote Code Execution
Selection_028
  • News

Have I been Pwned release more updates

May 31, 2016

As you all know, there have been many many many data breach's lately, you know LinkedIn again recently admitted to...

Read MoreRead more about Have I been Pwned release more updates
Selection_010
  • Tutorials

Using airodump-ng WiFi

May 22, 2016

Now many of you that are reading this are fully aware of the wireless hacking arena. So i'm not going...

Read MoreRead more about Using airodump-ng WiFi
Fisher
  • News

Phineas Fisher records and publishes latest attack

May 20, 2016

Phineas Fisher, the hacker that was behind the Hacking Team and the Gamma International breaches and data leaks, is at it again....

Read MoreRead more about Phineas Fisher records and publishes latest attack
teslacrypt-closed
  • News

TeslaCrypt shuts down and Releases Master Decryption Key

May 19, 2016

In surprising end to TeslaCrypt, the developers shut down their ransomware and released the master decryption key. Over the past few weeks,...

Read MoreRead more about TeslaCrypt shuts down and Releases Master Decryption Key
Settings Menu
  • Tutorials

LinkedIn hack : Enable 2FA

May 18, 2016

Remember the LinkedIn hack of 2o12? with around 6.5 million password leaked? Well apparently that wasn't all of it. New...

Read MoreRead more about LinkedIn hack : Enable 2FA
SpiderFoot
  • Tutorials

SpiderFoot v2.7 – OSINT

May 16, 2016

SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a...

Read MoreRead more about SpiderFoot v2.7 – OSINT
FBI-Cellebrite
  • News

FBI crack the iPhone with external help from Cellebrite

March 29, 2016

The FBI has managed to unlock the iPhone of the San Bernardino gunman without Apple's help, ending a court case,...

Read MoreRead more about FBI crack the iPhone with external help from Cellebrite
hacker
  • News

LA Hospital Pays Ransomware

February 20, 2016

A large Los Angeles hospital chose to pay hackers who were holding its computer network hostage, a move its CEO said...

Read MoreRead more about LA Hospital Pays Ransomware
Netgear_logo_2014.svg
  • News
  • Tutorials

Netgear GS108Tv2 Information Disclosure Vulnerability

February 10, 2016

I have recently found a vulnerability on my Netgear Managed Switch I use at home. Its an information disclosure vulnerability....

Read MoreRead more about Netgear GS108Tv2 Information Disclosure Vulnerability
LastPass-ProtonMail
  • Tutorials

How to use LastPass and ProtonMail with 2 passwords

February 3, 2016

LastPass and ProtonMail how to guide If your like me, you have many many many password to keep track of....

Read MoreRead more about How to use LastPass and ProtonMail with 2 passwords
EBay_former_logo.svg
  • News

eBay REFUSE to fix major security vulnerability

February 3, 2016

Attackers can bypass controls to distribute malware. eBay has refused to fix a major flaw in its online sales platform...

Read MoreRead more about eBay REFUSE to fix major security vulnerability
google
  • News

Google’s Project Zero gives Malwarebytes a kicking

February 3, 2016

GOOGLE'S SECURITY street gang Project Zero has been kicking sand in the face of Malwarebytes and picking the firm's protection...

Read MoreRead more about Google’s Project Zero gives Malwarebytes a kicking
m3
  • News

Nasa hack: 10,000 machines infected by malware, says security expert

February 2, 2016

There are over 10,000 machines that are currently infected by malware in Nasa, showing that the US space agency definitely...

Read MoreRead more about Nasa hack: 10,000 machines infected by malware, says security expert
ASDA_logo.svg
  • News

Asda website leaves customer details vulnerable for 677 days

February 1, 2016

Asda, the second largest supermarket in the UK by market share, reportedly failed to patch a vulnerability in its online...

Read MoreRead more about Asda website leaves customer details vulnerable for 677 days
hacker
  • Tutorials

Recipe for disaster – One Metasploit, One Facebook a dash of iframes and a sprinkle of Social Engineering

January 30, 2016

I wanted to make a point to someone and show how easy it is to get hacked... This is how...

Read MoreRead more about Recipe for disaster – One Metasploit, One Facebook a dash of iframes and a sprinkle of Social Engineering
java-logo-100027745-large
  • News

Oracle to Kill Java Browser Plugin

January 28, 2016

Oracle on Wednesday announced specific plans to kill the Java browser plugin and has advised users to start migrating to...

Read MoreRead more about Oracle to Kill Java Browser Plugin
LG-LOGO
  • News

LG Patches Severe Smartphone Hijack Vulnerability

January 28, 2016

LG today released a security update for some of its latest smartphones to resolve a severe vulnerability found in the...

Read MoreRead more about LG Patches Severe Smartphone Hijack Vulnerability
kali-rolling-screenshot
  • News

Kali Linux – Rolling Edition Released

January 24, 2016

Welcome back to the RedPacket Security website. An important milestone for Offensive Security has come with the first public release of...

Read MoreRead more about Kali Linux – Rolling Edition Released
GoPhish9
  • Tutorials

GoPhish! – Install tutorial for InfoSec people to train staff on phishing

January 22, 2016

So I have fired up a VM of Ubuntu and typed the following I soon found out that on a vanilla...

Read MoreRead more about GoPhish! – Install tutorial for InfoSec people to train staff on phishing
GCHQ at Cheltenham, Gloucestershire
  • News

GCHQ have designed built-in backdoors to allow snooping

January 22, 2016

An aerial image of the Government Communications Headquarters (GCHQ) in Cheltenham, Gloucestershire. GCHQ is one of the three UK Intelligence...

Read MoreRead more about GCHQ have designed built-in backdoors to allow snooping
SSH Kippo Honeypot
  • Tutorials

Kippo Honeypot Attack – Linux XorDDOS malware

January 6, 2016

So I have had my kippo honeypot running for a while and got some pretty good statistics from it. But...

Read MoreRead more about Kippo Honeypot Attack – Linux XorDDOS malware
Invite-Beta
  • News

Review of Beta ProtonMail Android App

November 11, 2015

            So we have all heard about the recent DDoS attack on ProtonMail over the...

Read MoreRead more about Review of Beta ProtonMail Android App

Posts pagination

Previous 1 … 4,099 4,100 4,101 4,102 4,103 4,104 4,105 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-45529

May 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5198

May 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-46173

May 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5222

May 28, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5278

May 28, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel