Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
bitcoin-4912864_1280
  • News

The issue and circulation of cryptocurrencies will be banned in Russia

March 20, 2020

On March 16, a Representative of the Bank of Russia, Alexey Guznov, announced a possible ban on the issue and...

Read MoreRead more about The issue and circulation of cryptocurrencies will be banned in Russia
about_europol
  • News

Europol Arrests 2 Dozen Suspects of SIM-Swap Fraud Following Cross-Border Investigations

March 20, 2020

Following an increase in SIM-jacking over the recent months, Europol announces the arrest of at least more than two dozen...

Read MoreRead more about Europol Arrests 2 Dozen Suspects of SIM-Swap Fraud Following Cross-Border Investigations
osint
  • News

Is WhatsApp the new Coronavirus of Facebook?

March 20, 2020

The health officials and government authorities are trying their best to inform the public about the safety precautions amid the...

Read MoreRead more about Is WhatsApp the new Coronavirus of Facebook?
osint
  • News

Microsoft shuts down the infamous Necurs Botnet!

March 20, 2020

Microsoft announced on Tuesday that in collaboration with its industry parents, it has successfully shut down the famous botnet Necurs-...

Read MoreRead more about Microsoft shuts down the infamous Necurs Botnet!
InstaSave_1
  • News

InstaSave – Python Script To Download Images, Videos & Profile Pictures From Instagram

March 20, 2020

InstaSave is a python script to download images, videos & profile pictures from Instagram without any API access.FeaturesDownload Instagram PhotosDownload...

Read MoreRead more about InstaSave – Python Script To Download Images, Videos & Profile Pictures From Instagram
XSHOCK_1
  • News

xShock – Shellshock Exploit

March 20, 2020

xShock ShellShock (CVE-2014-6271)This tool exploits shellshock.Written by Hulya KarabagVersion 1.0.0Instagram: Capture the RootScreenshotsHow to useRead MeAll founded directories will be...

Read MoreRead more about xShock – Shellshock Exploit
WFH
  • News

The Importance of Network Visibility With a Remote Workforce

March 20, 2020

We are now living in challenging times due to the COVID-19 outbreak as we work from home, self-isolate, and protect...

Read MoreRead more about The Importance of Network Visibility With a Remote Workforce
osint
  • News

Report: NutriBullet’s website injected with skimmer three times by Magecart Group 8

March 19, 2020

Since February, a prominent Magecart cybercriminal group has injected the same Java-based payment card skimmer program not one, not two,...

Read MoreRead more about Report: NutriBullet’s website injected with skimmer three times by Magecart Group 8
osint
  • News

Spyware disguised as COVID-19 tracker app actually keeps track of users

March 19, 2020

Another malicious actor has weaponized an otherwise legitimate, interactive coronavirus tracking map created by Johns Hopkins University — this time...

Read MoreRead more about Spyware disguised as COVID-19 tracker app actually keeps track of users
WHO_
  • News

Cybercriminals impersonate World Health Organization to distribute fake coronavirus e-book

March 19, 2020

The number of scams, threats, and malware campaigns taking advantage of public concern over the coronavirus is increasing each day....

Read MoreRead more about Cybercriminals impersonate World Health Organization to distribute fake coronavirus e-book
pexels-photo-207580
  • News

New Malicious Program ‘Nefilim’ Threatens to Release Stolen User Data

March 19, 2020

Nefilim, a new malicious program that basically is ransomware that functions by encrypting files on affected systems, has become active...

Read MoreRead more about New Malicious Program ‘Nefilim’ Threatens to Release Stolen User Data
abstract-blue-digital-man-990x400-1
  • News

Hunting APTs with YARA

March 19, 2020

For the past few years, we have been spreading our knowledge and experience of using YARA, often called a pattern...

Read MoreRead more about Hunting APTs with YARA
chepy_1_logo
  • News

Chepy – A Python Lib/Cli Equivalent Of The Awesome CyberChef Tool.

March 19, 2020

Chepy is a python library with a handy cli that is aimed to mirror some of the capabilities of CyberChef....

Read MoreRead more about Chepy – A Python Lib/Cli Equivalent Of The Awesome CyberChef Tool.
sshuttle
  • News

Sshuttle – Transparent Proxy Server That Works As A Poor Man’S VPN. Forwards Over SSH

March 19, 2020

As far as I know, sshuttle is the only program that solves the following common case:Your client machine (or router)...

Read MoreRead more about Sshuttle – Transparent Proxy Server That Works As A Poor Man’S VPN. Forwards Over SSH
cybersecurity-posture-
  • News

How to Maintain Your Cybersecurity Posture in Uncertain Times

March 19, 2020

Right now, we are all dealing with uncertain times, given the COVID-19 pandemic. The organizations we work for are depending...

Read MoreRead more about How to Maintain Your Cybersecurity Posture in Uncertain Times
osint
  • News

COVID-19 decoy doc, Cloudflare service used to spread ‘BlackWater’ malware

March 18, 2020

Researchers have uncovered a new malware campaign that uses the COVID-19 pandemic as a lure, and also abuses platform-as-a-service web...

Read MoreRead more about COVID-19 decoy doc, Cloudflare service used to spread ‘BlackWater’ malware
child-victim-experian-600x214-1
  • News

Child identity theft, part 2: How to reclaim your child’s identity

March 18, 2020

In a world where children as young as a single day old can fall prey to fraud, it is more...

Read MoreRead more about Child identity theft, part 2: How to reclaim your child’s identity
code
  • News

ESET: hackers used the Adobe brand to attack government websites

March 18, 2020

IT specialists of the Slovak company ESET warn of a new series of attacks committed by the Turla cyber-spy group,...

Read MoreRead more about ESET: hackers used the Adobe brand to attack government websites
gettyimages-642229652
  • News

The Worldwide Pandemic Prompts Technology Giant Samsung to Embrace Electronic Voting

March 18, 2020

There is no denying the fact that the rise of COVID-19 has taken the world by storm yet it’s very...

Read MoreRead more about The Worldwide Pandemic Prompts Technology Giant Samsung to Embrace Electronic Voting
55-1
  • News

Beware of Stalkerware That Has Eyes On All of Your Social Media!

March 18, 2020

Dear social media mongers, amidst all the talk about the Coronavirus and keeping your body’s health in check, your digital...

Read MoreRead more about Beware of Stalkerware That Has Eyes On All of Your Social Media!
osint
  • News

Some useful Cybersecurity tips every Work-from-home Employee must know

March 18, 2020

Amid the Coronavirus (COVID-19) panic, numerous corporates and organizations have told their employees to work from home as a safety...

Read MoreRead more about Some useful Cybersecurity tips every Work-from-home Employee must know
osint
  • News

Stay Wary of Third-Party Apps: Malware App ‘CovidLock’ Locks User Out of their Phone

March 18, 2020

In an attempt to block misinformation from being spread by developers taking advantage of the COVID-19 charged environment, Google started...

Read MoreRead more about Stay Wary of Third-Party Apps: Malware App ‘CovidLock’ Locks User Out of their Phone
lazydocker_1
  • News

Lazydocker – The Lazier Way To Manage Everything Docker

March 18, 2020

A simple terminal UI for both docker and docker-compose, written in Go with the gocui library.Minor rant incoming: Something's not...

Read MoreRead more about Lazydocker – The Lazier Way To Manage Everything Docker
pypykatz_1
  • News

Pypykatz – Mimikatz Implementation In Pure Python

March 18, 2020

Mimikatz implementation in pure Python. At least a part of it :)Runs on all OS's which support python>=3.6 WIKISince version...

Read MoreRead more about Pypykatz – Mimikatz Implementation In Pure Python

Posts pagination

Previous 1 … 4,131 4,132 4,133 4,134 4,135 4,136 4,137 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel