Today, cyber attacks are more numerous and cause damage in companies. Nevertheless, many software products exist to detect cyber threats. …
Severe Vulnerability Patched in CRI-O Container Engine for Kubernetes
A report by CrowdStrike reveals that an extreme weakness affecting the CRI-O container engine for Kubernetes could be utilized to …
Mip22 – An Advanced Phishing Tool
The program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of …
RefleXXion – A Utility Designed To Aid In Bypassing User-Mode Hooks Utilised By AV/EPP/EDR Etc
Introduction RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass …
Patching – An Interactive Binary Patching Plugin For IDA Pro
Patching assembly code to change the behavior of an existing program is not uncommon in malware analysis, software reverse engineering, …
Lnkbomb – Malicious Shortcut Generator For Collecting NTLM Hashes From Insecure File Shares
Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The vulnerability exists due to Windows looking for …
Meta Releases Open-Source Browser Extension for Checking Code Authenticity
Meta, which is Facebook’s parent company, has announced the release of new technology that it aims to implement in its …
GoodHound – Uses Sharphound, Bloodhound And Neo4j To Produce An Actionable List Of Attack Paths For Targeted Remediation
Attackers think in graphs, defenders think in actions, management think in charts. GoodHound operationalises Bloodhound by determining the busiest paths …
DomainAlerting – Daily Alert When A New Domain Name Is Registered And Contains Your Keywords
Daily alert when a new domain name is registered and contains your keywords. Description DomainAlerting tool allows you to perform …
Nivistealer – Steal Victim Images Exact Location Device Info And Much More
Steal Victim Images Exact Location Device Info And Much More Features of Nivi-Stealer: Steal Ip Steal Device Info Uses Device …