Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Mastering Blockchain Security Strategies for a Safer Digital Future

July 14, 2025
unlock_membership
  • Premium Members Content

Mastering Web Application Security Strategies

July 11, 2025
unlock_membership
  • Premium Members Content

Unlocking the Power of Zero Trust Security for Modern Organizations

July 9, 2025
unlock_membership
  • Premium Members Content

Unlocking Blockchain Security Strategies for a Safer Digital Future

July 7, 2025
unlock_membership
  • Premium Members Content

Mastering Phishing Attacks: How to Recognize and Prevent These Cyber Threats

July 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
Mobile-200x125-1
  • News

Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks

March 5, 2020

The Android banking trojan Geost was first revealed in a research by Sebastian García, Maria Jose Erquiaga and Anna Shirokova...

Read MoreRead more about Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks
digital_expert
  • News

Are our police forces equipped to deal with modern cybercrimes?

March 5, 2020

“You should have asked for the presence of a digital detective,” Karen said when I told her what happened at...

Read MoreRead more about Are our police forces equipped to deal with modern cybercrimes?
brighton-station-905615__340
  • News

UK-Based Network Rail Confirms Online Exposure of Wi-Fi User Data

March 5, 2020

The travel details and email addresses of around 10,000 commuters who used free wi-fi provided at UK railway stations were...

Read MoreRead more about UK-Based Network Rail Confirms Online Exposure of Wi-Fi User Data
Privilege2BEscalation
  • News

PrivescCheck – Privilege Escalation Enumeration Script For Windows

March 5, 2020

This script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information...

Read MoreRead more about PrivescCheck – Privilege Escalation Enumeration Script For Windows
TwitWork_2
  • News

TwitWork – Monitor Twitter Stream

March 5, 2020

Monitor twitter stream.TwitWork use the twitter stream which allows you to have a tweets in real-time.There is an input that...

Read MoreRead more about TwitWork – Monitor Twitter Stream
path-oscp-offensive-security-professional-penetration-pen-testing
  • News

Lessons Learned from an Unlikely Path to My OSCP Certification

March 5, 2020

About one year ago, my colleague Trevor O’Donnal wrote a blog post, “Why a 17-Year Veteran Pen Tester Took the...

Read MoreRead more about Lessons Learned from an Unlikely Path to My OSCP Certification
feature_vul-300x300-200x200-1
  • News

Security Risks in Online Coding Platforms

March 4, 2020

By David Fiser (Senior Cyber Threat Researcher) Threat Modeling for Online Coding Platforms Before cloud integrated development environments (IDEs) became...

Read MoreRead more about Security Risks in Online Coding Platforms
osint
  • News

Child identity theft, part 1: On familiar fraud

March 4, 2020

In 2013, 30-year-old Axton Betz-Hamilton received an angry phone call from her father two weeks after her mother, Pam, died....

Read MoreRead more about Child identity theft, part 1: On familiar fraud
social-1206612_960_720
  • News

A vulnerability that Allows Hackers to Hijack Facebook Accounts

March 4, 2020

A cybersecurity expert recently found a vulnerability in FB's "login with the Facebook feature." According to the expert, the vulnerability...

Read MoreRead more about A vulnerability that Allows Hackers to Hijack Facebook Accounts
transcribe_console_1
  • News

Amazon Transcribe Can Automatically Shroud the User’s Personal Information from Call Transcripts?

March 4, 2020

Amazon Transcribe, the AWS-based 'speech-to-text service, recently came up with a significant new feature which, if executed effectively, can spontaneously...

Read MoreRead more about Amazon Transcribe Can Automatically Shroud the User’s Personal Information from Call Transcripts?
22-1
  • News

Windows 10 Users Beware! TrickBots’ Prevalence And Conveyance Escalates in Devices

March 4, 2020

Reports mention that recently attackers were found exploiting the latest version of the “Remote Desktop ActiveX” which was developed for...

Read MoreRead more about Windows 10 Users Beware! TrickBots’ Prevalence And Conveyance Escalates in Devices
XCTR-Hacking-Tools_1
  • News

XCTR Hacking Tools – All in one tools for Information Gathering

March 4, 2020

All in one tools for Information Gathering.Instagram: Capture the RootScreenshotsRead MeInitially, you need to create a project where you will...

Read MoreRead more about XCTR Hacking Tools – All in one tools for Information Gathering
wifi-passview_8_screenshot
  • News

WiFi Passview v2.0 – An Open Source Batch Script Based WiFi Passview For Windows!

March 4, 2020

WiFi Passview is an open source batch script based program that can recover your WiFi Password easily in seconds. This...

Read MoreRead more about WiFi Passview v2.0 – An Open Source Batch Script Based WiFi Passview For Windows!
rapid7-quarterly-threat-report-q1-2020
  • News

Rapid7 2020 Threat Report: Exposing Common Attacker Trends

March 4, 2020

If you joined Rapid7 at RSAC 2020 just a few days ago, you probably caught wind of Rapid7’s end-of-year threat...

Read MoreRead more about Rapid7 2020 Threat Report: Exposing Common Attacker Trends
osint
  • News

Data-stealing ransomware hits parts maker for Tesla, Boeing and Lockheed Martin

March 3, 2020

Visser Precision, a parts maker and manufacturing solutions provider for the aerospace, automotive, industrial and manufacturing industries, has reportedly suffered...

Read MoreRead more about Data-stealing ransomware hits parts maker for Tesla, Boeing and Lockheed Martin
osint
  • News

Lock and Code S1Ep1: On RSA, the human element, and the week in security

March 3, 2020

Last week, we told you we were launching a fortnightly podcast, called Lock and Code. This week, we made good...

Read MoreRead more about Lock and Code S1Ep1: On RSA, the human element, and the week in security
credit-card
  • News

The hacker explained why in Russia cards will become more often blocked

March 3, 2020

Hacker Alexander Warski told what to expect from Governing Bodies. According to him, bank cards will more often be blocked...

Read MoreRead more about The hacker explained why in Russia cards will become more often blocked
dnsFookup_1_create
  • News

dnsFookup – DNS Rebinding Toolkit

March 3, 2020

DNS Rebinding freamwork containing:a dns server obviouslyweb api to create new subdomains and control the dns server, view logs, stuff...

Read MoreRead more about dnsFookup – DNS Rebinding Toolkit
BadBlood_1
  • News

BadBlood – Fills A Microsoft Active Directory Domain With A Structure And Thousands Of Objects

March 3, 2020

BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the...

Read MoreRead more about BadBlood – Fills A Microsoft Active Directory Domain With A Structure And Thousands Of Objects
RSA
  • News

How We Used Data Science Magic to Predict Key RSA 2020 Themes and Takeaways

March 3, 2020

This blog was co-authored by Mark Hamill and Bob Rudis.There’s nothing quite like attending the annual RSA security conference in...

Read MoreRead more about How We Used Data Science Magic to Predict Key RSA 2020 Themes and Takeaways
fraud2Balert
  • News

New Lampion Trojan Found Attacking Portuguese Users

March 2, 2020

There's a new Trojan in town - "The Lampion Trojan", this malware as discovered by security researchers is distributed via...

Read MoreRead more about New Lampion Trojan Found Attacking Portuguese Users
xencrypt_1_bypass
  • News

Xencrypt – A PowerShell Script Anti-Virus Evasion Tool

March 2, 2020

Tired of wasting lots of time obfuscating PowerShell scripts like invoke-mimikatz only to have them get detected anyway? Wouldn't it...

Read MoreRead more about Xencrypt – A PowerShell Script Anti-Virus Evasion Tool
subfinder_5_subfinder-run
  • News

Subfinder – A Subdomain Discovery Tool That Discovers Valid Subdomains For Websites

March 2, 2020

subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a...

Read MoreRead more about Subfinder – A Subdomain Discovery Tool That Discovers Valid Subdomains For Websites
vpn-4046047_960_720
  • News

Hackers Exploit Vulnerabilities in Pulse VPN and Android Devices to Launch Heavy Cyberattack

March 1, 2020

The vulnerability named CVE-2019-1150 has affected Pulse VPN's network and is regarded as highly 'severe.' Whereas vulnerability named CVE-2019-2215 targets...

Read MoreRead more about Hackers Exploit Vulnerabilities in Pulse VPN and Android Devices to Launch Heavy Cyberattack

Posts pagination

Previous 1 … 4,210 4,211 4,212 4,213 4,214 4,215 4,216 … 4,243 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Greta Group

July 15, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Victoria Garden

July 15, 2025
image
  • Data Breach
  • Ransomware

[LYNX] – Ransomware Victim: Adrian Kenya

July 15, 2025
image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: Otjiwarongo Municipality

July 15, 2025
image
  • Data Breach
  • Ransomware

[AKIRA] – Ransomware Victim: Studioc

July 15, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel