Source code for malware that targets Qiui Cellmate device was leaked online
The source code for the ChastityLock ransomware that was used in attacks aimed at the users of the Qiui Cellmate...
The source code for the ChastityLock ransomware that was used in attacks aimed at the users of the Qiui Cellmate...
Security expert Stefan Umit Uygur, CEO and Co-Founder at 4Securitas Ltd, provided his vision about the Cyber-defence solutions on the...
This tool can be used to visualize the MUD files in JSON format. MotivationMUD files are plain text files in...
PIDRILA: Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer is really fast async web path scanner prototype developed by BrightSearch team...
A cyber attack hit the New Zealand central bank, sensitive information has been potentially accessed by the intruders The New...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Researchers from Trend Micro discovered that the TeamTNT botnet is now able to steal Docker API logins along with AWS...
Dassault Falcon Jet has disclosed a data breach that exposed personal information belonging to current and former employees. In December...
Customized Password/Passphrase List inputting Target InfoInstallationgit clone https://github.com/edoardottt/longtongue.git cd longtongue python3 longtongue.pyUsageusage: longtongue.py Customized Password/Passphrase List inputting Target Infooptional arguments:...
hide processes and filescurrently emp3r0r uses libemp3r0r to hide its files and processes, which utilizes glibc hijacking persistencecurrently implemented methods:...
CISA revealed that threat actors behind the SolarWinds hack also used password guessing and password spraying in its attacks. Cybersecurity...
Twitter has permanently suspended the account of President Donald Trump on Friday, due to the risk of further incitement of...
Nvidia has released security updates to address high-severity vulnerabilities affecting the Nvidia GPU display driver and vGPU software. Nvidia has...
United States Department of State approved the creation of the Bureau of Cyberspace Security and Emerging Technologies (CSET). The United...
Credential Dumping Tool for SolarWinds Orion Blog post: https://malicious.link/post/2020/solarflare-release-password-dumper-for-solarwinds-orion/Credit to @asolino, @gentilkiwi, and @skelsec for helping me figuring out DPAPI....
A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces...
A misconfigured Git server is the root cause for the leak of source code of mobile apps and internal tools...
Multiple threat actors have recently started using the Ezuri memory loader as a loader to executes malware directly into the...
The US Federal Bureau of Investigation (FBI) issued a security alert warning private sector companies of Egregor ransomware attacks. The...
The Ryuk ransomware had a disruptive impact on multiple industries around the world, operators already earned more than $150 million....
Experts spotted the RokRat Trojan being used by North Korea-linked threat actors in attacks aimed at the South Korean government....
A script that can see if an email address is valid in Office365. This does not perform any login attempts,...
SARENKA is an Open Source Intelligence (OSINT) tool which helps you obtaining and understanding Attack Surface. The main goal is...
How many of you got that call at the beginning of the pandemic to make your company’s workforce 100% capable...