Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
15
  • News

WhatsApp’s New Feature Lets You Add More People To Group Video Calls!

April 23, 2020

Finally! The days of whining about the limited number of participants you could add to WhatsApp’s group video and audio...

Read MoreRead more about WhatsApp’s New Feature Lets You Add More People To Group Video Calls!
sas-at-home_intro-749x400-2
  • News

What does it take to become a good reverse engineer?

April 23, 2020

How much money and effort does it take to become a good reverse engineer? Do you even need to be...

Read MoreRead more about What does it take to become a good reverse engineer?
sas-at-home_intro-749x400-1
  • News

SAS, sweet SAS

April 23, 2020

As you may already know from our social network posts, we have rescheduled the SAS 2020 conference for November 18-21...

Read MoreRead more about SAS, sweet SAS
Impulse_1
  • News

Impulse – Impulse Denial-of-service ToolKit

April 23, 2020

Modern Denial-of-service ToolKitMain windowMethods:Method Target Description SMS +PHONE SMS & CALL FLOOD NTP IP:PORT NTP amplification is a type of...

Read MoreRead more about Impulse – Impulse Denial-of-service ToolKit
nullsacan
  • News

Nullscan – A Modular Framework Designed To Chain And Automate Security Tests

April 23, 2020

A modular framework designed to chain and automate security tests. It parses target definitions from the command line and runs...

Read MoreRead more about Nullscan – A Modular Framework Designed To Chain And Automate Security Tests
top-books-we-reccomend-rapid7-blog
  • News

Stuck Inside? Top Books We Recommend Security Pros Read During Quarantine

April 23, 2020

Staying at home is our new normal, which means many of us have wound up with a little more free...

Read MoreRead more about Stuck Inside? Top Books We Recommend Security Pros Read During Quarantine
sl-sl-1526_herschelfprint-i-01-000-600x311-1
  • News

The passwordless present: Will biometrics replace passwords forever?

April 22, 2020

When it comes to securing your sensitive, personally identifiable information against criminals who can engineer countless ways to snatch it...

Read MoreRead more about The passwordless present: Will biometrics replace passwords forever?
czech2Brepublic
  • News

Hackers attacked hospitals in the Czech Republic: Russia is suspected

April 22, 2020

According to the Lidové noviny newspaper, a foreign state may be behind the cyberattacks, and hacker groups from Russia may...

Read MoreRead more about Hackers attacked hospitals in the Czech Republic: Russia is suspected
githubFind3r_1
  • News

githubFind3r – Fast Command Line Repo/User/Commit Search Tool

April 22, 2020

githubFind3r is a very fast command line repo/user/commit search toolInstallationgit clone https://github.com/atmoner/githubFind3r.gitcd githubFind3rnpm installRun itnode githubFind3r.jsDownload githubFind3r Original Source

Read MoreRead more about githubFind3r – Fast Command Line Repo/User/Commit Search Tool
httpgrep
  • News

Httpgrep – Scans HTTP Servers To Find Given Strings In URIs

April 22, 2020

A python tool which scans for HTTP servers and finds given strings in URIs.Usage$ httpgrep -H--====--usage httpgrep -h <args> -s...

Read MoreRead more about Httpgrep – Scans HTTP Servers To Find Given Strings In URIs
Accelerate
  • News

How InsightIDR Is Accelerating Detection and Response in Modern Environments

April 22, 2020

A comprehensive approach yields 4.5x ROI for customersIn today’s disparate environment, it’s crucial to have a security information and event...

Read MoreRead more about How InsightIDR Is Accelerating Detection and Response in Modern Environments
DevOps-200x200-1
  • News

Exposed Redis Instances Abused for Remote Code Execution, Cryptocurrency Mining

April 21, 2020

By David Fiser and Jaromir Horejsi (Threat Researchers) Recently, we wrote an article about more than 8,000 unsecured Redis instances...

Read MoreRead more about Exposed Redis Instances Abused for Remote Code Execution, Cryptocurrency Mining
FIGTELFHASHBLOG
  • News

Grouping Linux IoT Malware Samples With Trend Micro ELF Hash

April 21, 2020

  The internet of things (IoT) has swiftly become a seemingly indispensable part of our daily lives. The IoT devices...

Read MoreRead more about Grouping Linux IoT Malware Samples With Trend Micro ELF Hash
osint
  • News

Smart TVs spoofed to deliver billions of fake ad impressions

April 21, 2020

A cybergang created a botnet that used SmartTVs to generate fake eyeballs for a massive ad fraud campaign that saw...

Read MoreRead more about Smart TVs spoofed to deliver billions of fake ad impressions
osint
  • News

A week in security (April 13 – 19)

April 21, 2020

Last week on Malwarebytes Labs, we looked at how to avoid Zoom bombing, weighed the risks of surveillance versus pandemics,...

Read MoreRead more about A week in security (April 13 – 19)
russia2Bwolrd2Bmap
  • News

Russia to develop a video platform similar to Zoom

April 21, 2020

The Ministry of Digital Development, Communications and Mass Media of the Russian Federation will develop a similar Zoom platform for...

Read MoreRead more about Russia to develop a video platform similar to Zoom
22-3
  • News

Google Is All Set To Fight The Coronavirus Themed Phishing Attacks and Scams

April 21, 2020

These days of lock-down have left cyber-criminals feeling pretty antsy about “working from home”. Not that it has mattered because...

Read MoreRead more about Google Is All Set To Fight The Coronavirus Themed Phishing Attacks and Scams
Adamantium-Thief_1_passwords
  • News

Adamantium-Thief – Decrypt Chromium Based Browsers Passwords, Cookies, Credit Cards, History, Bookmarks

April 21, 2020

Get chromium browsers: passwords, credit cards, history, cookies, bookmarks.Chrome 80 > is supported!Examples:Get passwords from browsers:Stealer.exe PASSWORDSGet credit cards from...

Read MoreRead more about Adamantium-Thief – Decrypt Chromium Based Browsers Passwords, Cookies, Credit Cards, History, Bookmarks
lk_scraper_1
  • News

Lk Scraper – An Fully Configurable Linkedin Scrape (Scrape Anything Within Linkedin)

April 21, 2020

Scrapes Any Linkedin DataInstallation$ pip install git+git://github.com/jqueguiner/lk_scraperSetupUsing Docker compose$ docker-compose up -d$ docker-compose run lk_scraper python3Using Docker only for selenium...

Read MoreRead more about Lk Scraper – An Fully Configurable Linkedin Scrape (Scrape Anything Within Linkedin)
rapid7-confessions-blog-image-01
  • News

Confessions of a Former CISO: Promoting Individual Contributors into Leadership Roles

April 21, 2020

My name is Scott King, and I am the Senior Director of Advisory Services at Rapid7. But before that, I...

Read MoreRead more about Confessions of a Former CISO: Promoting Individual Contributors into Leadership Roles
rome-1618323_1920
  • News

Resources on the Main Street Lending Program to Support Small and Mid-Sized Businesses

April 21, 2020

As part of Rapid7’s mission to support the community during this difficult (AKA surreal and dangerous) time, we are drawing...

Read MoreRead more about Resources on the Main Street Lending Program to Support Small and Mid-Sized Businesses
copyright-4064225_960_720
  • News

Can open source software be bought?

April 20, 2020

Open-source softwares (OSS) are released under a special license that makes its source code available to the user to inspect,...

Read MoreRead more about Can open source software be bought?
firefox-quantum-logo-BF9C2C7D9D-seeklogo.com_
  • News

CERT-In Alerts Mozilla Firefox Users to Update their Browsers Immediately

April 20, 2020

Mozilla Firefox users are receiving alerts regarding multiple vulnerabilities in the web browser by the Indian Computer Emergency Response Team...

Read MoreRead more about CERT-In Alerts Mozilla Firefox Users to Update their Browsers Immediately
hchW2frUfR3VozYDLjzXba-1200-80
  • News

Google Doubling Down On Efforts to Protect Android Users

April 20, 2020

With the rise in the in-application subscription scams on Android, Google subsequently announced the introduction of new Play Store policies...

Read MoreRead more about Google Doubling Down On Efforts to Protect Android Users

Posts pagination

Previous 1 … 4,121 4,122 4,123 4,124 4,125 4,126 4,127 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel