Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025
unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
code
  • News

ESET: hackers used the Adobe brand to attack government websites

March 18, 2020

IT specialists of the Slovak company ESET warn of a new series of attacks committed by the Turla cyber-spy group,...

Read MoreRead more about ESET: hackers used the Adobe brand to attack government websites
gettyimages-642229652
  • News

The Worldwide Pandemic Prompts Technology Giant Samsung to Embrace Electronic Voting

March 18, 2020

There is no denying the fact that the rise of COVID-19 has taken the world by storm yet it’s very...

Read MoreRead more about The Worldwide Pandemic Prompts Technology Giant Samsung to Embrace Electronic Voting
55-1
  • News

Beware of Stalkerware That Has Eyes On All of Your Social Media!

March 18, 2020

Dear social media mongers, amidst all the talk about the Coronavirus and keeping your body’s health in check, your digital...

Read MoreRead more about Beware of Stalkerware That Has Eyes On All of Your Social Media!
osint
  • News

Some useful Cybersecurity tips every Work-from-home Employee must know

March 18, 2020

Amid the Coronavirus (COVID-19) panic, numerous corporates and organizations have told their employees to work from home as a safety...

Read MoreRead more about Some useful Cybersecurity tips every Work-from-home Employee must know
osint
  • News

Stay Wary of Third-Party Apps: Malware App ‘CovidLock’ Locks User Out of their Phone

March 18, 2020

In an attempt to block misinformation from being spread by developers taking advantage of the COVID-19 charged environment, Google started...

Read MoreRead more about Stay Wary of Third-Party Apps: Malware App ‘CovidLock’ Locks User Out of their Phone
lazydocker_1
  • News

Lazydocker – The Lazier Way To Manage Everything Docker

March 18, 2020

A simple terminal UI for both docker and docker-compose, written in Go with the gocui library.Minor rant incoming: Something's not...

Read MoreRead more about Lazydocker – The Lazier Way To Manage Everything Docker
pypykatz_1
  • News

Pypykatz – Mimikatz Implementation In Pure Python

March 18, 2020

Mimikatz implementation in pure Python. At least a part of it :)Runs on all OS's which support python>=3.6 WIKISince version...

Read MoreRead more about Pypykatz – Mimikatz Implementation In Pure Python
measure-success-vulnerability-management-program
  • News

Redefining How to Measure the Success of Your Vulnerability Management Program

March 18, 2020

Could your team be wasting its time reporting vulnerability metrics that don’t matter? Security teams often fall into the trap...

Read MoreRead more about Redefining How to Measure the Success of Your Vulnerability Management Program
osint
  • News

Foreign APT groups use coronavirus phishing lures to drop RAT malware

March 17, 2020

Each day, as the novel coronavirus multiplies and spreads, so do cyber scams capitalizing on users’ fears and thirst for...

Read MoreRead more about Foreign APT groups use coronavirus phishing lures to drop RAT malware
osint
  • News

Password found to rescue victims of malicious COVID-19 tracker app

March 17, 2020

Members of the IT and cybersecurity communities have successfully obtained a password key for victims of CovidLock Android ransomware, which...

Read MoreRead more about Password found to rescue victims of malicious COVID-19 tracker app
osint
  • News

Lock and Code S1Ep2: On the challenges of managed service providers

March 17, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep2: On the challenges of managed service providers
1-1
  • News

APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT

March 17, 2020

Since the coronavirus became a worldwide health issue, the desire for more information and guidance from government and health authorities...

Read MoreRead more about APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT
office-594132_1280
  • News

Cybersecurity experts told how to protect yourself when working from home

March 17, 2020

After the World Health Organization (WHO) officially recognized the outbreak of COVID-2019 as a pandemic, many employers offered their employees...

Read MoreRead more about Cybersecurity experts told how to protect yourself when working from home
osint
  • News

Hackers take advantage of Coronavirus panic, launch Cyberattacks

March 17, 2020

The whole world is in high alert with coronavirus COVID-19, as being declared a pandemic and every government is making...

Read MoreRead more about Hackers take advantage of Coronavirus panic, launch Cyberattacks
abstract-smartphone-camera-990x400-1
  • News

MonitorMinor: vicious stalkerware

March 17, 2020

The other day, our Android traps ensnared an interesting specimen of stalkerware — commercial software that is usually used to...

Read MoreRead more about MonitorMinor: vicious stalkerware
token-reverser
  • News

Token-Reverser – Word List Generator To Crack Security Tokens

March 17, 2020

Word list generator to crack security tokens.Example use case You are testing reset password function Reset password token was sent...

Read MoreRead more about Token-Reverser – Word List Generator To Crack Security Tokens
shuffledns_5_shuffledns-run
  • News

shuffleDNS – Wrapper Around Massdns Written In Go That Allows You To Enumerate Valid Subdomains

March 17, 2020

shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as...

Read MoreRead more about shuffleDNS – Wrapper Around Massdns Written In Go That Allows You To Enumerate Valid Subdomains
multi-layered-approach-security
  • News

How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach

March 17, 2020

Recently, we interviewed Anthony Edwards, director of security operations for Hilltop Holdings, about how his financial holdings organization approaches multi-level...

Read MoreRead more about How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach
COVID-19-rapid7-communication
  • News

Our Commitment to Keeping Your Organization Secure During COVID-19

March 17, 2020

COVID-19 has created a great deal of concern and uncertainty, and we want to reassure our customers that your security...

Read MoreRead more about Our Commitment to Keeping Your Organization Secure During COVID-19
work-from-home-wfh-digital-self
  • News

How to WFH and Keep Your Digital Self Safe

March 17, 2020

We have rapidly entered a new era of living with a global pandemic. As a result, many are working from...

Read MoreRead more about How to WFH and Keep Your Digital Self Safe
849012-computer
  • News

2 New Android Malwares on The Hunt to Gain Control of User’s Account

March 16, 2020

As per discoveries of competent security software two new Android malware is on the hunt to 'discreetly' access control of...

Read MoreRead more about 2 New Android Malwares on The Hunt to Gain Control of User’s Account
osint
  • News

Google rewards 100,000$ as bug bounty prize!

March 16, 2020

Google has awarded 100,000 dollars prize to a Dutch researcher Wouter ter Maat for the Google Cloud Platform (GCP), for...

Read MoreRead more about Google rewards 100,000$ as bug bounty prize!
AWSGen.py_1_example
  • News

AWSGen.py – Generates Permutations, Alterations And Mutations Of AWS S3 Buckets Names

March 16, 2020

AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names.Download AWSGen.py Original Source

Read MoreRead more about AWSGen.py – Generates Permutations, Alterations And Mutations Of AWS S3 Buckets Names
jeopardize
  • News

Jeopardize – A Low(Zero) Cost Threat Intelligence & Response Tool Against Phishing Domains

March 16, 2020

Jeopardize tool is developed to provide basic threat intelligence&response capabilities against phishing domains at the minimum cost as possible. It...

Read MoreRead more about Jeopardize – A Low(Zero) Cost Threat Intelligence & Response Tool Against Phishing Domains

Posts pagination

Previous 1 … 4,208 4,209 4,210 4,211 4,212 4,213 4,214 … 4,245 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

HIBP-Banner-1
  • Data Breach

MaReads – 74,453 breached accounts

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7600

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7596

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7597

July 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-7599

July 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel