Uchihash – A Small Utility To Deal With Malware Embedded Hashes
Uchihash is a small utility that can save malware analysts the time of dealing with embedded hash values used for...
Uchihash is a small utility that can save malware analysts the time of dealing with embedded hash values used for...
The attribute ms-mcs-AdmPwd stores the clear-text LAPS password. This executable is made to be executed within Cobalt Strike session using...
China-linked APT31 group employed a new strain of malware in attacks aimed at entities in Mongolia, Belarus, Canada, the US,...
INFRA:HALT is a set of vulnerabilities affecting a popular TCP/IP library commonly OT devices manufactured by more than 200 vendors....
Cyber Defense Magazine August 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 148 pages of...
China linked APT groups have targeted networks of at least five major telecommunications companies operating in Southeast Asia since 2017....
To flutter: to move in quick, irregular motions, to beat rapidly, to be agitated.Doldrums: a period of stagnation. Doldrums is...
This is an integration of the Ghidra decompiler and Sleigh Disassembler for rizin. It is solely based on the decompiler...
Cisco addressed a vulnerability in the Firepower Device Manager (FDM) On-Box software that allows attackers to execute arbitrary code on...
A flaw in the GitHub Actions workflow for PyPI ’s source repository could be exploited to potentially execute arbitrary code...
Did you ever stop to think that the office smart TV used for company presentations, Zoom meetings, and other work-related...
Cybersecurity researchers disclosed multiple flaws, dubbed PwnedPiper, that left a widely-used pneumatic tube system (PTS) vulnerable to attacks. Researchers from...
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to...
The PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their...
Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. BleepingComputer found evidence that...
An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under...
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance...
A PowerShell script to collect memory and (triage) disk forensics for incident response investigations. The script leverages a network share,...
Kaspersky experts spotted a previously undocumented Chinese-speaking threat actor, tracked as GhostEmperor, that is targeting Microsoft Exchange flaws in attacks...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure...
Microsoft Office 365 email accounts of employees at 27 US Attorneys’ offices were breached by the Russia-linked SVR group as part of...
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future...
Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial...