Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
vhosts-sieve
  • News

Vhosts-Sieve – Searching For Virtual Hosts Among Non-Resolvable Domains

June 20, 2020

Searching for virtual hosts among non-resolvable domains.Installationgit clone https://github.com/dariusztytko/vhosts-sieve.gitpip3 install -r vhosts-sieve/requirements.txtUsageGet a list of subdomains (e.g. using Amass)$ amass...

Read MoreRead more about Vhosts-Sieve – Searching For Virtual Hosts Among Non-Resolvable Domains
osint
  • News

Malicious Google extensions research points out ‘unintended consequence’ of cloud computing

June 19, 2020

Researchers at Awake Security have made news over the past 24 hours exposing a scheme in which some 79 malicious...

Read MoreRead more about Malicious Google extensions research points out ‘unintended consequence’ of cloud computing
osint
  • News

Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?

June 19, 2020

“Two can play at this game…” Cybersecurity is a non-stop arms race between white hats and malicious hackers, and the...

Read MoreRead more about Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?
osint
  • News

Facial recognition: tech giants take a step back

June 19, 2020

Last week, a few major tech companies informed the public that they will not provide facial recognition software to law...

Read MoreRead more about Facial recognition: tech giants take a step back
osint
  • News

Hackers can now spy your conversations via a simple house bulb

June 19, 2020

What if hackers can spy and record your conversation without a digital device? What if your conversations could be retrieved...

Read MoreRead more about Hackers can now spy your conversations via a simple house bulb
formphish_1
  • News

Formphish – Auto Phishing Form-Based Websites

June 19, 2020

Auto Phishing form-based websites. This tool can automatically detect inputs on html form-based websites to create a phishing page.Features:Auto detect...

Read MoreRead more about Formphish – Auto Phishing Form-Based Websites
sgn_6_usage
  • News

SGN – Encoder Ported Into Go With Several Improvements

June 19, 2020

SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a...

Read MoreRead more about SGN – Encoder Ported Into Go With Several Improvements
How-Rapid7-Customers-Are-Using-Network-Traffic-Analysis-in-Detection-and-Response-2
  • News

How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response

June 19, 2020

In case you missed it, we introduced Network Traffic Analysis for our InsightIDR and MDR customers a few months back....

Read MoreRead more about How Rapid7 Customers Are Using Network Traffic Analysis in Detection and Response
osint
  • News

Cyber snoops targeted aerospace, defense employees with fake job offers on LinkedIn

June 18, 2020

A cyber espionage operation used fake job offers, sent via LinkedIn messages, to target employees at aerospace and military companies...

Read MoreRead more about Cyber snoops targeted aerospace, defense employees with fake job offers on LinkedIn
resume
  • News

Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature

June 18, 2020

This blog post was authored by Hossein Jazi and Jérôme Segura On June 10, we found a malicious Word document...

Read MoreRead more about Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature
osint
  • News

End of line: supporting IoT in the home

June 18, 2020

Trouble is potentially brewing in Internet of Things (IoT) land, even if the consequences may still be a little way...

Read MoreRead more about End of line: supporting IoT in the home
IMG_1363
  • News

The Russian quality system (Roskachestvo) spoke about the vulnerabilities of “smart” homes

June 18, 2020

According to Roskachestvo, the Internet of things devices can violate the physical and information security of the owner if hackers...

Read MoreRead more about The Russian quality system (Roskachestvo) spoke about the vulnerabilities of “smart” homes
osint
  • News

All You Need to Know About the Recent DDoS Attacks and Threats that have Surfaced in the U.S

June 18, 2020

Cybersecurity experts have denied incidents of any DDoS s attacks in recent times. However, the attacks on T-Mobile's services that...

Read MoreRead more about All You Need to Know About the Recent DDoS Attacks and Threats that have Surfaced in the U.S
IMG_1360
  • News

Devicelock: data from 115 thousand Russians was put up for sale on the Web

June 18, 2020

A database with the data of Russians stuck abroad because of the coronavirus and returning to their homeland was put...

Read MoreRead more about Devicelock: data from 115 thousand Russians was put up for sale on the Web
osint
  • News

Know ways to avoid credit or debit card frauds

June 18, 2020

Since 2016, when India decided to go cashless the growth of online payments increased exponentially but not without risks. Online...

Read MoreRead more about Know ways to avoid credit or debit card frauds
blockchain-3750157_1280
  • News

Apple’s APSDaemon Vulnerability Abused by Malware Distributors

June 18, 2020

Attackers can maliciously redirect users on websites sharing counterfeit products, adult content or videos and dupe them into installing malware...

Read MoreRead more about Apple’s APSDaemon Vulnerability Abused by Malware Distributors
securelist_wasd_game-990x400-1
  • News

Do cybercriminals play cyber games during quarantine?

June 18, 2020

Thanks to the coronavirus pandemic, the role of the Internet in our lives has undergone changes, including irreversible ones. Some...

Read MoreRead more about Do cybercriminals play cyber games during quarantine?
TeaBreak_1_Tea252520Break
  • News

TeaBreak – A Productivity Burp Extension Which Reminds To Take Break While You Are At Work!

June 18, 2020

TeaBreak is a simple burp extension for security researchers and bug bounty hunters for helping them to increase their work...

Read MoreRead more about TeaBreak – A Productivity Burp Extension Which Reminds To Take Break While You Are At Work!
Digital-Signature-Hijack_1
  • News

Digital Signature Hijack – Binaries, PowerShell Scripts And Information About Digital Signature Hijacking

June 18, 2020

Hijacking legitimate digital signatures is a technique that can be used during red team assessments in order to sign PowerShell...

Read MoreRead more about Digital Signature Hijack – Binaries, PowerShell Scripts And Information About Digital Signature Hijacking
The-Security-Practitioner-s-Intro-to-the-Cloud-Everything-You-Ever-Wanted-to-Know-But-Were-Afraid-to-Ask
  • News

The Security Practitioner’s Intro to the Cloud: Everything You Ever Wanted to Know But Were Afraid to Ask

June 18, 2020

Before I bought a house a few years ago, my understanding of mortgages was pretty shaky at best. I only...

Read MoreRead more about The Security Practitioner’s Intro to the Cloud: Everything You Ever Wanted to Know But Were Afraid to Ask
IMG_1351
  • News

In Armenia data about thousands of patients with coronavirus were leaked

June 17, 2020

The National Security Service of Armenia (NSS) finds out that the personal data of 3,500 patients with coronavirus and their...

Read MoreRead more about In Armenia data about thousands of patients with coronavirus were leaked
SecretFinder_1
  • News

SecretFinder – A Python Script For Find Sensitive Data (Apikeys, Accesstoken, JWT…) And Search Anything On Javascript Files

June 17, 2020

SecretFinder is a python script based on LinkFinder, written to discover sensitive data like apikeys, accesstoken, authorizations, jwt,..etc in JavaScript...

Read MoreRead more about SecretFinder – A Python Script For Find Sensitive Data (Apikeys, Accesstoken, JWT…) And Search Anything On Javascript Files
post-img-62859
  • News

SIEM Security Tools: Six Expensive Misconceptions

June 17, 2020

How next-gen SIEM security solutions increase time to value in a modern threat environmentThe changing security landscape demands the most...

Read MoreRead more about SIEM Security Tools: Six Expensive Misconceptions
Unlocking-the-Power-of-Macro-Authentication-Part-One2
  • News

Unlocking the Power of Macro Authentication: Part One

June 17, 2020

This blog post is part one in a three-part series on macro authentication.You may have come across macro authentication when...

Read MoreRead more about Unlocking the Power of Macro Authentication: Part One

Posts pagination

Previous 1 … 4,105 4,106 4,107 4,108 4,109 4,110 4,111 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel