CISA adds 41 flaws to its Known Exploited Vulnerabilities Catalog
US Critical Infrastructure Security Agency (CISA) adds 41 new vulnerabilities to its Known Exploited Vulnerabilities Catalog. The Cybersecurity & Infrastructure...
US Critical Infrastructure Security Agency (CISA) adds 41 new vulnerabilities to its Known Exploited Vulnerabilities Catalog. The Cybersecurity & Infrastructure...
anonymously reverse shell over onion network using If you are having any operating system compatiblity issue, let me know. I...
Reposaur is the open source compliance tool for development platforms. Audit, verify and report on your data and configurations easily...
Trend Micro addressed a DLL hijacking issue in Trend Micro Security actively exploited by a China-linked threat group to deploy...
Threat actors behind web skimming campaigns are using malicious JavaScript to mimic Google Analytics and Meta Pixel scripts to avoid...
Interpol Secretary warns that nation-state malware will become available on the cybercrime underground in a couple of years. Interpol Secretary...
Russia-linked APT group Turla was observed targeting the Austrian Economic Chamber, a NATO eLearning platform, and the Baltic Defense College....
pip3 install frelatageCurrent release : Frelatage is a coverage-based Python fuzzing library which can be used to fuzz python code....
Researchers warn that the Fronton botnet was used by Russia-linked threat actors for coordinated disinformation campaigns. Fronton is a distributed...
A security researcher announced the discovery of an unpatched flaw in PayPal that could allow attackers to steal money from...
FindWall is Python script that allows to understand if your network provider is limiting your access to the Internet by...
Google’s Threat Analysis Group (TAG) uncovered campaigns targeting Android users with five zero-day vulnerabilities. Google’s Threat Analysis Group (TAG) researchers...
Researchers uncovered a malware campaign targeting the infoSec community with fake Proof Of Concept to deliver a Cobalt Strike beacon....
Commonly used tools for Red Teaming Engagements, Physical Security Assessments, and Tactical Covert Entry. In this list I decided to...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
North Korea-linked Lazarus APT is exploiting the Log4J remote code execution (RCE) in attacks aimed at VMware Horizon servers. North...
OSINT tool to scrape names and usernames from large friend lists on Facebook, without being rate limited. Getting started: Install...
The Pwn2Own Vancouver 2022 hacking contest ended, Trend Micro and ZDI awarded a total of $1,155,000 for successful attempts! During...
DISCLAIMER This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in...
The media company Nikkei has disclosed a ransomware attack and revealed that the incident might have impacted customer data. The...
Security researchers from ESET reported that the Russia-linked APT group Sandworm continues to target Ukraine. Security experts from ESET reported...
Tetanus is a Windows and Linux C2 agent written in rust. Installation To install Tetanus, you will need Mythic set...
Cisco addressed a medium-severity vulnerability affecting IOS XR Software, the company warns that the flaw is actively exploited in the...
Taiwanese vendor QNAP warned customers of a new wave of DeadBolt ransomware attacks and urges them to install the latest...