Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025
unlock_membership
  • Premium Members Content

Mastering IoT Security Strategies for a Safer Connected World

August 6, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Forensic Analysis in Cybersecurity

August 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
IMG_1463
  • News

Expert says Durov the main role in the process that will end the US monopoly

June 23, 2020

One of the most discussed news in the Internet community was the unblocking of the popular Telegram messenger by Roskomnadzor....

Read MoreRead more about Expert says Durov the main role in the process that will end the US monopoly
osint
  • News

CSIRO’s Data61 Developed Voice Liveness Detection ‘Void’ to Safeguard Users Against Voice Spoofing Attacks

June 23, 2020

Spoofing attacks that impersonate user's devices to steal data, spread malware, or bypass access controls are becoming increasingly popular as...

Read MoreRead more about CSIRO’s Data61 Developed Voice Liveness Detection ‘Void’ to Safeguard Users Against Voice Spoofing Attacks
securelist_graph_abstract-990x400-1
  • News

Web skimming with Google Analytics

June 23, 2020

Web skimming is a common class of attacks generally aimed at online shoppers. The principle is quite simple: malicious code...

Read MoreRead more about Web skimming with Google Analytics
sayhello_1
  • News

SAyHello – Capturing Audio (.Wav) From Target Using A Link

June 23, 2020

Capturing audio (.wav) from target using a linkHow it works?After the user grants microphone permissions, a website redirect button of...

Read MoreRead more about SAyHello – Capturing Audio (.Wav) From Target Using A Link
lynis2.1.1
  • News

Lynis 3.0.0 – Security Auditing Tool for Unix/Linux Systems

June 23, 2020

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core...

Read MoreRead more about Lynis 3.0.0 – Security Auditing Tool for Unix/Linux Systems
Advancements-in-Vulnerability-Reporting-in-the-Post-PGP-Era-A-Conversation-with-Art-Manion
  • News

Advancements in Vulnerability Reporting in the Post-PGP Era: A Conversation with Art Manion

June 23, 2020

On this week’s episode of Security Nation, Art Manion of the CERT Coordination Center gets us up to speed on...

Read MoreRead more about Advancements in Vulnerability Reporting in the Post-PGP Era: A Conversation with Art Manion
download
  • News

One Of Tech Giant Oracle’s Many Start-ups Uses Tracking Tech to Follow Users around the Web

June 22, 2020

The multinational computer technology corporation Oracle has spent almost 10 years and billions of dollars purchasing startups to fabricate its...

Read MoreRead more about One Of Tech Giant Oracle’s Many Start-ups Uses Tracking Tech to Follow Users around the Web
recon
  • News

O.G. AUTO-RECON – Enumerate A Target Based Off Of Nmap Results

June 22, 2020

Enumerate a target Based off of Nmap ResultsFeaturesThe purpose of O.G. Auto-Recon is to automate the initial information gathering phase...

Read MoreRead more about O.G. AUTO-RECON – Enumerate A Target Based Off Of Nmap Results
Zip2BCracker
  • News

Zip Cracker – Python Script To Crack Zip Password With Dictionary Attack And Also Use Crunch As Pipeline

June 22, 2020

This Script Supports Only Zip File in This VersionYou Can Also Use This Script With crunchCross-platform SupportedUsage: zipcracker.py Options: --version...

Read MoreRead more about Zip Cracker – Python Script To Crack Zip Password With Dictionary Attack And Also Use Crunch As Pipeline
IMG_1412
  • News

Sberbank Says Cyber Criminals Using Artificial Intelligence In Banking Trojan

June 21, 2020

Hackers, using artificial intelligence, created a new generation of banking Trojans, which is quite difficult to recognize, said Deputy Chairman...

Read MoreRead more about Sberbank Says Cyber Criminals Using Artificial Intelligence In Banking Trojan
security-2337429_1280
  • News

Cognizant Reveals Employees Data Compromised by Maze Ransomware

June 21, 2020

Leading IT services company, Cognizant was hit by a Maze Ransomware attack earlier in April this year that made headlines...

Read MoreRead more about Cognizant Reveals Employees Data Compromised by Maze Ransomware
DroidTracker_1
  • News

DroidTracker – Script To Generate An Android App To Track Location In Real Time

June 21, 2020

Script to generate an Android App to track location in real timeFeatures:Custom App Name2 Port Forwarding options (Ngrok or using...

Read MoreRead more about DroidTracker – Script To Generate An Android App To Track Location In Real Time
iox
  • News

Iox – Tool For Port Forward &Amp; Intranet Proxy

June 21, 2020

Tool for port forward & intranet proxy, just like lcx/ew, but betterWhy write?lcx and ew are awesome, but can be...

Read MoreRead more about Iox – Tool For Port Forward &Amp; Intranet Proxy
960x0
  • News

SMS System Now A Long-Gone Era; Google Brings Out A New Update

June 20, 2020

With the rise of encrypted alternatives of SMS messages, WhatsApp, iMessage, and Signal, the SMS system has become a 'throwback...

Read MoreRead more about SMS System Now A Long-Gone Era; Google Brings Out A New Update
IMG_1378
  • News

Medvedev: law enforcement agencies will need new technologies for detecting cybercrime

June 20, 2020

According to the Deputy head of the Russian Security Council, the Internet is becoming more open, and this makes it...

Read MoreRead more about Medvedev: law enforcement agencies will need new technologies for detecting cybercrime
matrix-5028024_960_720
  • News

Secondary Infektion: A Russian Disinformation Operation Agency You Need to Know About

June 20, 2020

The secret campaign was famous as "Secondary Infektion," and it worked separately from the IRA and GRU, staying hidden for...

Read MoreRead more about Secondary Infektion: A Russian Disinformation Operation Agency You Need to Know About
abstract-digital-990x400-1
  • News

Microcin is here

June 20, 2020

In February 2020, we observed a Trojan injected into the system process memory on a particular host. The target turned...

Read MoreRead more about Microcin is here
oss-fuzz_1_process
  • News

OSS-Fuzz – Continuous Fuzzing Of Open Source Software

June 20, 2020

Fuzz testing is a well-known technique for uncovering programming errors in software. Many of these detectable errors, like buffer overflow,...

Read MoreRead more about OSS-Fuzz – Continuous Fuzzing Of Open Source Software
vhosts-sieve
  • News

Vhosts-Sieve – Searching For Virtual Hosts Among Non-Resolvable Domains

June 20, 2020

Searching for virtual hosts among non-resolvable domains.Installationgit clone https://github.com/dariusztytko/vhosts-sieve.gitpip3 install -r vhosts-sieve/requirements.txtUsageGet a list of subdomains (e.g. using Amass)$ amass...

Read MoreRead more about Vhosts-Sieve – Searching For Virtual Hosts Among Non-Resolvable Domains
osint
  • News

Malicious Google extensions research points out ‘unintended consequence’ of cloud computing

June 19, 2020

Researchers at Awake Security have made news over the past 24 hours exposing a scheme in which some 79 malicious...

Read MoreRead more about Malicious Google extensions research points out ‘unintended consequence’ of cloud computing
osint
  • News

Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?

June 19, 2020

“Two can play at this game…” Cybersecurity is a non-stop arms race between white hats and malicious hackers, and the...

Read MoreRead more about Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?
osint
  • News

Facial recognition: tech giants take a step back

June 19, 2020

Last week, a few major tech companies informed the public that they will not provide facial recognition software to law...

Read MoreRead more about Facial recognition: tech giants take a step back
osint
  • News

Hackers can now spy your conversations via a simple house bulb

June 19, 2020

What if hackers can spy and record your conversation without a digital device? What if your conversations could be retrieved...

Read MoreRead more about Hackers can now spy your conversations via a simple house bulb
formphish_1
  • News

Formphish – Auto Phishing Form-Based Websites

June 19, 2020

Auto Phishing form-based websites. This tool can automatically detect inputs on html form-based websites to create a phishing page.Features:Auto detect...

Read MoreRead more about Formphish – Auto Phishing Form-Based Websites

Posts pagination

Previous 1 … 4,258 4,259 4,260 4,261 4,262 4,263 4,264 … 4,323 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]200[.]193[.]211:8090

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]113[.]217[.]92:8001

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]40[.]112[.]176:8087

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]143[.]114[.]43:8090

August 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel