British Hacker Faces Charges in $3.75 Million Insider Trading Scheme
In a significant case of cybercrime, a British hacker is facing charges in the US for his involvement in a...
In a significant case of cybercrime, a British hacker is facing charges in the US for his involvement in a...
SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall...
secator is a task and workflow runner used for security assessments. It supports dozens of well-known security tools and it...
BYOSI - Bring-Your-Own-Script-Interpreter - Leveraging the abuse of trusted applications, one is able to deliver a compatible script interpreter for...
file-unpumper is a powerful command-line utility designed to clean and analyze Portable Executable (PE) files. It provides a range of...
The Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic...
Mass Assigner is a powerful tool designed to identify and exploit mass assignment vulnerabilities in web applications. It achieves this...
Mass Assigner is a powerful tool designed to identify and exploit mass assignment vulnerabilities in web applications. It achieves this...
Evade EDR's the simple way, by not touching any of the API's they hook. Theory I've noticed that most EDRs...
Evade EDR's the simple way, by not touching any of the API's they hook. Theory I've noticed that most EDRs...
A make an LKM rootkit visible again. This tool is part of research on LKM rootkits that will be launched....
ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.Another way to make an LKM visible is using the imperius trick: https://github.com/MatheuZSecurity/ImperiusDownload ModTracer...
DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more. What...
Three men have admitted their roles in operating a notorious website that assisted cybercriminals in bypassing multi-factor authentication (MFA) to...
A former IT engineer is facing serious charges after an alleged plot to extort his previous employer in Missouri. This...
Following a damaging U.S. government report criticizing Microsoft's cybersecurity practices, which had allowed Chinese hackers access to the email accounts...
The Federal Bureau of Investigation (FBI) and Google-owned cybersecurity firm Mandiant are on the frontlines, working diligently to combat a...
The FBI, in collaboration with Mandiant, a cybersecurity firm owned by Google, is intensifying efforts to track and disrupt a...
Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok...
A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean,...
Tool for Fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage :-) Its main...
A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only....
XM Goat is composed of XM Cyber terraform templates that help you learn about common Azure security issues. Each template...
Analyse binaries for missing security features, information disclosure and more. Extrude is in the early stages of development, and currently...