Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Unveiling Hidden Clues: Mastering Forensic Analysis in Cybersecurity

June 13, 2025
unlock_membership
  • Premium Members Content

Unveiling the Hidden Dangers of Advanced Persistent Threats

June 11, 2025
unlock_membership
  • Premium Members Content

Mastering Cloud Security Strategies for a Safer Digital Future

June 9, 2025
unlock_membership
  • Premium Members Content

Mastering Network Security Techniques for a Safer Digital World

June 6, 2025
unlock_membership
  • Premium Members Content

Securing the Future: Cybersecurity Strategies for Critical Infrastructure

June 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
h38
  • News

NTLMRecon – A Tool To Enumerate Information From NTLM Authentication Enabled Web Endpoints

March 9, 2020

Note that the tool is still under development. Things may break anytime - hence, beta!A fast and flexible NTLM reconnaissance...

Read MoreRead more about NTLMRecon – A Tool To Enumerate Information From NTLM Authentication Enabled Web Endpoints
HoneyBot_1_packettotal
  • News

HoneyBot – Capture, Upload And Analyze Network Traffic

March 9, 2020

HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently this library provides...

Read MoreRead more about HoneyBot – Capture, Upload And Analyze Network Traffic
download
  • News

Encryption Flaws Allow Hackers to Steal Vehicles without Leaving a Trace

March 8, 2020

New vulnerabilities were revealed earlier this week in the encryption frameworks utilized by immobilizers, the radio-enabled gadgets within cars that...

Read MoreRead more about Encryption Flaws Allow Hackers to Steal Vehicles without Leaving a Trace
europe-2021308_1280
  • News

Lithuania leads a European Union Cyber Rapid Response Team (CRRT) at the European Union

March 8, 2020

Lithuania, the Netherlands, Poland, Romania, Croatia, and Estonia signed a Memorandum on the establishment of a European Union Cyber Rapid...

Read MoreRead more about Lithuania leads a European Union Cyber Rapid Response Team (CRRT) at the European Union
Http-Asynchronous-Reverse-Shell_1_Architecture
  • News

HTTP Asynchronous Reverse Shell – Asynchronous Reverse Shell Using The HTTP Protocol

March 8, 2020

Today there are many ways to create a reverse shell in order to be able to remotely control a machine...

Read MoreRead more about HTTP Asynchronous Reverse Shell – Asynchronous Reverse Shell Using The HTTP Protocol
entropy_1
  • News

Entropy Toolkit – A Set Of Tools To Exploit Netwave And GoAhead IP Webcams

March 8, 2020

Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for...

Read MoreRead more about Entropy Toolkit – A Set Of Tools To Exploit Netwave And GoAhead IP Webcams
osint
  • News

Don’t install that security certificate; it’s a malware scam

March 7, 2020

Cybercriminals have been compromising websites to display a fake security certificate error message in hopes of tricking visitors into downloading...

Read MoreRead more about Don’t install that security certificate; it’s a malware scam
osint
  • News

Bring your own privacy: VPNs for consumers and orgs

March 7, 2020

VPNs (virtual private networks) have been popular for quite some time now, and they’re worth a huge amount of money...

Read MoreRead more about Bring your own privacy: VPNs for consumers and orgs
99
  • News

Attention! Malvertising Campaigns Using Exploit Kits On The Rise

March 7, 2020

Of all the things that online advertising could be used for, spreading malware is the one that throws you off...

Read MoreRead more about Attention! Malvertising Campaigns Using Exploit Kits On The Rise
coronavirus-4842056_1280
  • News

Group-IB informed about the distribution of fake news about 20 thousand coronaviruses infected in Moscow

March 7, 2020

A fake audio recording appeared on the Internet, where the girl reports about 20 thousand cases of coronavirus COVID-19 in...

Read MoreRead more about Group-IB informed about the distribution of fake news about 20 thousand coronaviruses infected in Moscow
pasted2Bimage2B0
  • News

SharpRDP – Remote Desktop Protocol .NET Console Application For Authenticated Command Execution

March 7, 2020

To compile open the project in Visual Studio and build for release. Two DLLs will be output to the Release...

Read MoreRead more about SharpRDP – Remote Desktop Protocol .NET Console Application For Authenticated Command Execution
ghost_1
  • News

Ghost Framework – An Android Post Exploitation Framework That Uses An Android Debug Bridge To Remotely Access A n Android Device

March 7, 2020

Ghost Framework is an Android post exploitation framework that uses anAndroid Debug Bridge to remotely access an Android device. Ghost...

Read MoreRead more about Ghost Framework – An Android Post Exploitation Framework That Uses An Android Debug Bridge To Remotely Access A n Android Device
osint
  • News

Technology and the power of moral panic

March 6, 2020

Moral panic is a fascinating topic, and often finds itself tied up in the cutting edge-technology of the times once it...

Read MoreRead more about Technology and the power of moral panic
infected
  • News

Group-IB spottted new fake messages about the coronavirus during the day

March 6, 2020

Group-IB, a company that specializes in preventing cyberattacks has revealed new fake messages about the spread of coronavirus over the...

Read MoreRead more about Group-IB spottted new fake messages about the coronavirus during the day
Android2BMalware
  • News

Hackers Attack Amazon Web Services Server

March 6, 2020

A group of sophisticated hackers slammed Amazon Web Services (AWS) servers. The hackers established a rootkit that let them manually...

Read MoreRead more about Hackers Attack Amazon Web Services Server
hacker-2851143_1280
  • News

Information security experts have warned Russians about bonus card fraud schemes.

March 6, 2020

Fraudsters several thousand times tried to illegally take advantage of discount bonuses of Russians in 2019.Some attackers gained access to...

Read MoreRead more about Information security experts have warned Russians about bonus card fraud schemes.
abstract_blur_code-990x400-1
  • News

Mokes and Buerak distributed under the guise of security certificates

March 6, 2020

The technique of distributing malware under the guise of legitimate software updates is not new. As a rule, cybercriminals invite...

Read MoreRead more about Mokes and Buerak distributed under the guise of security certificates
extended-xss-search_2
  • News

Extended-XSS-Search – Scans For Different Types Of XSS On A List Of URLs

March 6, 2020

This is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker...

Read MoreRead more about Extended-XSS-Search – Scans For Different Types Of XSS On A List Of URLs
phonia_1
  • News

Phonia Toolkit – One Of The Most Advanced Toolkits To Scan Phone Numbers Using Only Free Resources

March 6, 2020

Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is...

Read MoreRead more about Phonia Toolkit – One Of The Most Advanced Toolkits To Scan Phone Numbers Using Only Free Resources
Barracuda
  • News

R7-2019-39 | CVE-2019-5648: LDAP Credential Exposure in Barracuda Load Balancer ADC (FIXED)

March 6, 2020

This post describes CVE-2019-5648, a vulnerability in the Barracuda Load Balancer ADC. A malicious actor who gains authenticated, administrative access...

Read MoreRead more about R7-2019-39 | CVE-2019-5648: LDAP Credential Exposure in Barracuda Load Balancer ADC (FIXED)
Mobile-200x125-1
  • News

Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks

March 5, 2020

The Android banking trojan Geost was first revealed in a research by Sebastian García, Maria Jose Erquiaga and Anna Shirokova...

Read MoreRead more about Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks
digital_expert
  • News

Are our police forces equipped to deal with modern cybercrimes?

March 5, 2020

“You should have asked for the presence of a digital detective,” Karen said when I told her what happened at...

Read MoreRead more about Are our police forces equipped to deal with modern cybercrimes?
brighton-station-905615__340
  • News

UK-Based Network Rail Confirms Online Exposure of Wi-Fi User Data

March 5, 2020

The travel details and email addresses of around 10,000 commuters who used free wi-fi provided at UK railway stations were...

Read MoreRead more about UK-Based Network Rail Confirms Online Exposure of Wi-Fi User Data
Privilege2BEscalation
  • News

PrivescCheck – Privilege Escalation Enumeration Script For Windows

March 5, 2020

This script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information...

Read MoreRead more about PrivescCheck – Privilege Escalation Enumeration Script For Windows

Posts pagination

Previous 1 … 4,135 4,136 4,137 4,138 4,139 4,140 4,141 … 4,169 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-5815

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2024-38822

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5938

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5282

June 15, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-22236

June 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok
pixel