Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
unlock_membership
  • Premium Members Content

Insider Threat Management: A Practical Guide for 2025 and Beyond

August 7, 2025
patreon presentation
  • Offensive Security
  • Premium Members Content

[PRESENTATION] TruffleHog: The Digital Detective

August 7, 2025
unlock_membership
  • Premium Members Content

Mastering IoT Security Strategies for a Safer Connected World

August 6, 2025
unlock_membership
  • Premium Members Content

Unlocking the Secrets of Forensic Analysis in Cybersecurity

August 4, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

image
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
3
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
4
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

image
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Injectics Write Up

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
AttackerKB-dark
  • News

Meet AttackerKB

April 16, 2020

In 2019, the number of new vulnerabilities published was more than double what we saw in 2016. 2020 is on...

Read MoreRead more about Meet AttackerKB
Patch-Tuesday-200x125-1
  • News

April Patch Tuesday: Fixes for Font-Related, Microsoft SharePoint, Windows Components Vulnerabilities

April 15, 2020

Microsoft fixed 113 vulnerabilities in this month’s Patch Tuesday, just two shy of last month’s 115. This continues the streak...

Read MoreRead more about April Patch Tuesday: Fixes for Font-Related, Microsoft SharePoint, Windows Components Vulnerabilities
Mobile-200x200-1
  • News

Coronavirus Update App Leads to Project Spy Android and iOS Spyware

April 15, 2020

By Tony Bao and Junzhi Lu We discovered a potential cyberespionage campaign, which we have named Project Spy, that infects...

Read MoreRead more about Coronavirus Update App Leads to Project Spy Android and iOS Spyware
image-9
  • Tutorials

How to Use John The Ripper in a Google Collab for FREE!

April 15, 2020

How many times have you needed to use John The Ripper to do some password cracking but just not had...

Read MoreRead more about How to Use John The Ripper in a Google Collab for FREE!
Zoom-Settings-600x477-1
  • News

Keep Zoombombing cybercriminals from dropping a load on your meetings

April 15, 2020

While shelter in place has left many companies struggling to stay in business during the COVID-19 epidemic, one company in...

Read MoreRead more about Keep Zoombombing cybercriminals from dropping a load on your meetings
moscow-2626012_1280
  • News

Dozens of cyberattacks on the website of the Mayor of Moscow have been recorded since the beginning of February

April 15, 2020

Group-IB specialists recorded several DDoS attacks on Moscow electronic services, including the mos.ru portal. This was announced by the CEO...

Read MoreRead more about Dozens of cyberattacks on the website of the Mayor of Moscow have been recorded since the beginning of February
22-2
  • News

Meghan Markle and Prince Harry’s Names Used for Fake Celebrity Endorsement of Bitcoins?

April 15, 2020

While the Coronavirus pandemic has practically driven people to stay locked up in their homes and spend a lot more...

Read MoreRead more about Meghan Markle and Prince Harry’s Names Used for Fake Celebrity Endorsement of Bitcoins?
htbenum_5_screenshot01
  • News

Htbenum – A Linux Enumeration Script For Hack The Box

April 15, 2020

This script is designed for use in situations where you do not have internet access on a Linux host and...

Read MoreRead more about Htbenum – A Linux Enumeration Script For Hack The Box
domained
  • News

Domained – Multi Tool Subdomain Enumeration

April 15, 2020

A domain name enumeration toolThe tools contained in domained requires Kali Linux (preferred) or Debian 7+ and Recon-ngdomained uses several...

Read MoreRead more about Domained – Multi Tool Subdomain Enumeration
patches-2
  • News

Patch Tuesday – April 2020

April 15, 2020

Global working-from-home routines haven't slowed down Microsoft and its ability to help close up vulnerabilities in their products. This April...

Read MoreRead more about Patch Tuesday – April 2020
osint
  • News

Pranksters installing MBRLocker wiper, blame Vitali Kremez, MalwareHunterTeam for attack

April 14, 2020

A malicious actor is trying to discredit two of the more well-known personalities in cybersecurity circles by including their names...

Read MoreRead more about Pranksters installing MBRLocker wiper, blame Vitali Kremez, MalwareHunterTeam for attack
osint
  • News

Lock and Code S1Ep4: coronavirus and responding to computer viruses with Akshay Bhargava

April 14, 2020

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...

Read MoreRead more about Lock and Code S1Ep4: coronavirus and responding to computer viruses with Akshay Bhargava
hands-1167612_1280
  • News

Attackers Hacked the Digital Pass System of Moscow residents

April 14, 2020

Moscow's residents are warned about scammers who offer to issue digital passes for moving around the city on social networksRecall...

Read MoreRead more about Attackers Hacked the Digital Pass System of Moscow residents
VMware-vCenter-Server-Bug-min
  • News

Critical Security Vulnerability Patched By VMware

April 14, 2020

VMware Inc. a publicly-traded software company recently fixed a critical security vulnerability that permitted the malicious attackers to access sensitive...

Read MoreRead more about Critical Security Vulnerability Patched By VMware
osint
  • News

Protect your phone from malicious apps by malware scanner VirusTotal Mobile

April 14, 2020

Google last year removed 85 apps from play store after security researchers found that these apps were adwares in disguise.These...

Read MoreRead more about Protect your phone from malicious apps by malware scanner VirusTotal Mobile
Data_Exfiltration_Methods
  • News

Lollipopz – Data Exfiltration Utility For Testing Detection Capabilities

April 14, 2020

Data exfiltration utility used for testing detection capabilities of security products. Obviously for legal purposes only.Exfiltration How-To/etc/shadow -> HTTP GET...

Read MoreRead more about Lollipopz – Data Exfiltration Utility For Testing Detection Capabilities
sherloq_1_sherloq
  • News

Sherloq – An Open-Source Digital Image Forensic Toolset

April 14, 2020

An open source image forensic toolset Introduction"Forensic Image Analysis is the application of image science and domain expertise to interpret...

Read MoreRead more about Sherloq – An Open-Source Digital Image Forensic Toolset
remote-work-readiness-wfh
  • News

Remote Work Readiness: How to Keep a Security Mindset

April 14, 2020

As companies respond to COVID-19, many require their employees to work from home. This migration of the workforce places the...

Read MoreRead more about Remote Work Readiness: How to Keep a Security Mindset
game-controller-1532747_1280
  • News

1.1 Million Customers Records of SCUF Gaming Exposed Online

April 13, 2020

The database of more than 1 million customers was exposed online by 'SCUF Gaming', a subsidiary of Corsair that develops...

Read MoreRead more about 1.1 Million Customers Records of SCUF Gaming Exposed Online
osint
  • News

COVID-19: Google and Apple Team up on Contact Trace Technology

April 13, 2020

Around the world, the governments and health departments are fighting together against the Coronavirus pandemic, coming up with solutions to...

Read MoreRead more about COVID-19: Google and Apple Team up on Contact Trace Technology
malware
  • News

Inhale – A Malware Analysis And Classification Tool

April 13, 2020

Inhale is a malware analysis and classification tool that is capable of automating and scaling many static analysis operations.This is...

Read MoreRead more about Inhale – A Malware Analysis And Classification Tool
privacybadger
  • News

Privacy Badger – A Browser Extension That Automatically Learns To Block Invisible Trackers

April 13, 2020

Privacy Badger is a browser extension that automatically learns to block invisible trackers. Instead of keeping lists of what to...

Read MoreRead more about Privacy Badger – A Browser Extension That Automatically Learns To Block Invisible Trackers
cisco-webex
  • News

Cisco “critical security advisory” part of a phishing campaign ?

April 12, 2020

Amidst the coronavirus pandemic, there is an influx of telecommuters who, have come to heavily depend on online conferencing tools...

Read MoreRead more about Cisco “critical security advisory” part of a phishing campaign ?
powershell-red
  • News

Audix – A PowerShell Tool To Quickly Configure The Windows Event Audit Policies For Security Monitoring

April 12, 2020

Audix will allow for the SIMPLE configuration of Windows Event Audit Policies. Window's Audit Policies are restricted by default. This...

Read MoreRead more about Audix – A PowerShell Tool To Quickly Configure The Windows Event Audit Policies For Security Monitoring

Posts pagination

Previous 1 … 4,277 4,278 4,279 4,280 4,281 4,282 4,283 … 4,323 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware ransomhub ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

unlock_membership
  • Premium Members Content

Data Encryption Demystified A Practical Guide for Securing Your Data

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 101[.]200[.]193[.]211:8090

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 47[.]113[.]217[.]92:8001

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 121[.]40[.]112[.]176:8087

August 8, 2025
Cobalt-Strike
  • Cobalt Strike

Cobalt Strike Beacon Detected – 43[.]143[.]114[.]43:8090

August 8, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel