Millions of devices could be hacked exploiting flaws targeted by tools stolen from FireEye
Millions of devices are potential exposed to attacks targeting the vulnerabilities exploited by the tools stolen from the arsenal of...
Millions of devices are potential exposed to attacks targeting the vulnerabilities exploited by the tools stolen from the arsenal of...
An easy-to-use and lightweight API wrapper for the Censys Search Engine (censys.io). Python 3.6+ is currently supported.Getting StartedThe library can...
Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features.UsageHelp$ ./webserver -helpweb subcommand -bind...
Happy HaXmas! We hope everyone is having a wonderful holiday season so far. This year has been wild and unpredictable,...
Google’s Project Zero experts publicly disclosed details of an improperly patched zero-day code execution vulnerability in Windows. White hat hackers...
GRecon (Greei-Conn) is a simple python tool that automates the process of Google Based Recon AKA Google Dorking The current...
For this year's HaXmas, we're giving the gift of Metasploit knowledge! We'll cover a mix of old, new, or recently...
Automated Web Assets Enumeration & Scanning Instructions for running Create an account on Zulip Navigate to Settings > Your Bots...
Israeli cyber security firm Cellebrite claims that it can decrypt messages from the popular Signal’s messaging app. Israeli security firm...
CyberNews Investigation team analyzed the 13 most popular messaging apps to see if the apps are really safe. Source: https://cybernews.com/security/research-nearly-all-of-your-messaging-apps-are-secure/...
Security experts shared lists of organizations that were infected with the SolarWinds Sunburst backdoor after decoding the DGA mechanism. Security...
Grawler is a tool written in PHP which comes with a web interface that automates the task of using google...
0d1n is a tool for automating customized attacks against web applications. This tool is very faster because uses thread pool...
T'was the night before HaXmas,when all through the house,Not a creature was stirring, not even a mouse.The stockings were hung...
Since 2018, thousands of enterprises have utilized InsightVM’s Goals and SLAs feature to build their organization-specific security goals. Through Goals...
A joint operation conducted by law European enforcement agencies resulted in the seizure of the infrastructure of three bulletproof VPN...
The IT giants VMware and Cisco revealed they were impacted by the recently disclosed SolarWinds supply chain attack. VMware and...
Multiple Dell Wyse thin client models are affected by critical vulnerabilities that could be exploited by a remote attacker to...
While investigating the recent SolarWinds Orion supply-chain attack security researchers discovered another backdoor, tracked SUPERNOVA. The investigation of the SolarWinds...
A sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss...
Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should...
Tens of Al Jazeera employees were targeted in a cyber espionage campaign leveraging a zero-click iOS zero-day vulnerability to hack...
Flavor and fragrance producer Symrise is the last victim of the Clop ransomware gang that claims to have stolen 500...
Experts uncovered a massive fraud operation that used a network of mobile device emulators to steal millions of dollars from...