Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
osint
  • News

Mass surveillance alone will not save us from coronavirus

April 16, 2020

As the pattern-shattering truth of our new lives drains heavy—as coronavirus rends routines, raids our wellbeing, and whiplashes us between...

Read MoreRead more about Mass surveillance alone will not save us from coronavirus
images
  • News

Best Practice Tips for Password Administration from Tech Security Insiders

April 16, 2020

Passwords have been an industry-standard as well as industry headache for a considerable length of time and their administration henceforth...

Read MoreRead more about Best Practice Tips for Password Administration from Tech Security Insiders
osint
  • News

Law Firms in Manitoba at a virtual standstill after being attacked by Maze ransomware!

April 16, 2020

Two law firms of Manitoba Law society have been hit by ransomware named Maze locking up their whole system and...

Read MoreRead more about Law Firms in Manitoba at a virtual standstill after being attacked by Maze ransomware!
burp-exporter_1_Screenshot_Exporter_01
  • News

Burp Exporter – A Burp Suite Extension To Copy A Request To The Clipboard As Multiple Programming Languages Functions

April 16, 2020

Exporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions.You can export...

Read MoreRead more about Burp Exporter – A Burp Suite Extension To Copy A Request To The Clipboard As Multiple Programming Languages Functions
crauEmu_1_crauEmu_logo
  • News

crauEmu – An uEmu Extension For Developing And Analyzing Payloads For Code-Reuse Attacks

April 16, 2020

crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks.Slides from ZeroNights 2019Demo 1 - X32-64, Edge,...

Read MoreRead more about crauEmu – An uEmu Extension For Developing And Analyzing Payloads For Code-Reuse Attacks
practicing-cmms-certification-practice-process
  • News

Preparing for the Cybersecurity Maturity Model Certification (CMMC) Part 1: Practice and Process

April 16, 2020

All of us here at Rapid7 hope that you and your families are safe and well during this unprecedented national...

Read MoreRead more about Preparing for the Cybersecurity Maturity Model Certification (CMMC) Part 1: Practice and Process
AttackerKB-dark
  • News

Meet AttackerKB

April 16, 2020

In 2019, the number of new vulnerabilities published was more than double what we saw in 2016. 2020 is on...

Read MoreRead more about Meet AttackerKB
Patch-Tuesday-200x125-1
  • News

April Patch Tuesday: Fixes for Font-Related, Microsoft SharePoint, Windows Components Vulnerabilities

April 15, 2020

Microsoft fixed 113 vulnerabilities in this month’s Patch Tuesday, just two shy of last month’s 115. This continues the streak...

Read MoreRead more about April Patch Tuesday: Fixes for Font-Related, Microsoft SharePoint, Windows Components Vulnerabilities
Mobile-200x200-1
  • News

Coronavirus Update App Leads to Project Spy Android and iOS Spyware

April 15, 2020

By Tony Bao and Junzhi Lu We discovered a potential cyberespionage campaign, which we have named Project Spy, that infects...

Read MoreRead more about Coronavirus Update App Leads to Project Spy Android and iOS Spyware
image-9
  • Tutorials

How to Use John The Ripper in a Google Collab for FREE!

April 15, 2020

How many times have you needed to use John The Ripper to do some password cracking but just not had...

Read MoreRead more about How to Use John The Ripper in a Google Collab for FREE!
Zoom-Settings-600x477-1
  • News

Keep Zoombombing cybercriminals from dropping a load on your meetings

April 15, 2020

While shelter in place has left many companies struggling to stay in business during the COVID-19 epidemic, one company in...

Read MoreRead more about Keep Zoombombing cybercriminals from dropping a load on your meetings
moscow-2626012_1280
  • News

Dozens of cyberattacks on the website of the Mayor of Moscow have been recorded since the beginning of February

April 15, 2020

Group-IB specialists recorded several DDoS attacks on Moscow electronic services, including the mos.ru portal. This was announced by the CEO...

Read MoreRead more about Dozens of cyberattacks on the website of the Mayor of Moscow have been recorded since the beginning of February
22-2
  • News

Meghan Markle and Prince Harry’s Names Used for Fake Celebrity Endorsement of Bitcoins?

April 15, 2020

While the Coronavirus pandemic has practically driven people to stay locked up in their homes and spend a lot more...

Read MoreRead more about Meghan Markle and Prince Harry’s Names Used for Fake Celebrity Endorsement of Bitcoins?
htbenum_5_screenshot01
  • News

Htbenum – A Linux Enumeration Script For Hack The Box

April 15, 2020

This script is designed for use in situations where you do not have internet access on a Linux host and...

Read MoreRead more about Htbenum – A Linux Enumeration Script For Hack The Box
domained
  • News

Domained – Multi Tool Subdomain Enumeration

April 15, 2020

A domain name enumeration toolThe tools contained in domained requires Kali Linux (preferred) or Debian 7+ and Recon-ngdomained uses several...

Read MoreRead more about Domained – Multi Tool Subdomain Enumeration
patches-2
  • News

Patch Tuesday – April 2020

April 15, 2020

Global working-from-home routines haven't slowed down Microsoft and its ability to help close up vulnerabilities in their products. This April...

Read MoreRead more about Patch Tuesday – April 2020
osint
  • News

Pranksters installing MBRLocker wiper, blame Vitali Kremez, MalwareHunterTeam for attack

April 14, 2020

A malicious actor is trying to discredit two of the more well-known personalities in cybersecurity circles by including their names...

Read MoreRead more about Pranksters installing MBRLocker wiper, blame Vitali Kremez, MalwareHunterTeam for attack
osint
  • News

Lock and Code S1Ep4: coronavirus and responding to computer viruses with Akshay Bhargava

April 14, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep4: coronavirus and responding to computer viruses with Akshay Bhargava
hands-1167612_1280
  • News

Attackers Hacked the Digital Pass System of Moscow residents

April 14, 2020

Moscow's residents are warned about scammers who offer to issue digital passes for moving around the city on social networksRecall...

Read MoreRead more about Attackers Hacked the Digital Pass System of Moscow residents
VMware-vCenter-Server-Bug-min
  • News

Critical Security Vulnerability Patched By VMware

April 14, 2020

VMware Inc. a publicly-traded software company recently fixed a critical security vulnerability that permitted the malicious attackers to access sensitive...

Read MoreRead more about Critical Security Vulnerability Patched By VMware
osint
  • News

Protect your phone from malicious apps by malware scanner VirusTotal Mobile

April 14, 2020

Google last year removed 85 apps from play store after security researchers found that these apps were adwares in disguise.These...

Read MoreRead more about Protect your phone from malicious apps by malware scanner VirusTotal Mobile
Data_Exfiltration_Methods
  • News

Lollipopz – Data Exfiltration Utility For Testing Detection Capabilities

April 14, 2020

Data exfiltration utility used for testing detection capabilities of security products. Obviously for legal purposes only.Exfiltration How-To/etc/shadow -> HTTP GET...

Read MoreRead more about Lollipopz – Data Exfiltration Utility For Testing Detection Capabilities
sherloq_1_sherloq
  • News

Sherloq – An Open-Source Digital Image Forensic Toolset

April 14, 2020

An open source image forensic toolset Introduction"Forensic Image Analysis is the application of image science and domain expertise to interpret...

Read MoreRead more about Sherloq – An Open-Source Digital Image Forensic Toolset
remote-work-readiness-wfh
  • News

Remote Work Readiness: How to Keep a Security Mindset

April 14, 2020

As companies respond to COVID-19, many require their employees to work from home. This migration of the workforce places the...

Read MoreRead more about Remote Work Readiness: How to Keep a Security Mindset

Posts pagination

Previous 1 … 4,123 4,124 4,125 4,126 4,127 4,128 4,129 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel