PenTesting laboratory deployed as IaC with Terraform on AWS. It deploys a Kali Linux instance accessible via ssh & wireguard …
Own an old WD My Book Live? Disconnect it from the internet right now
Western Digital is urging legacy My Book owners to unplug their devices from the internet without delay following a series …
Mythic – A Collaborative, Multi-Platform, Red Teaming Framework
A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It’s designed to provide …
‘Pen tester’ FIN7 hacking group member lands seven-year prison term
A “high-level” member of FIN7 has been sentenced to a seven-year term for his role in the cybercriminal group. On …
SharpHook – Tool Tath Uses Various API Hooks In Order To Give Us The Desired Credentials
SharpHook is inspired by the SharpRDPThief project, It uses various API hooks in order to give us the desired credentials. …
Crackonosh malware abuses Windows Safe mode to quietly mine for cryptocurrency
Researchers have discovered a strain of cryptocurrency-mining malware that abuses Windows Safe mode during attacks. The malware, dubbed Crackonosh by …
BlobHunter – Find Exposed Data In Azure With This Public Blob Scanner
An opensource tool for scanning Azure blob storage accounts for publicly opened blobs.BlobHunter is a part of “Hunting Azure Blobs …
Three Texan men jailed after using Grindr to find targets for theft, kidnap, assault
Three men have been jailed for violent crimes conducted against victims found through Grindr. Michael Atkinson, Pablo Ceniceros-Deleon, and Daryl …
Researcher Discovers Susceptibility Affecting Numerous Linux Marketplaces
The cross-site scripting (XSS) susceptibility plus various supply chain operations greatly impact on the Linux marketplaces, which are located on …
Fully-Homomorphic-Encryption – Libraries And Tools To Perform Fully Homomorphic Encryption Operations On An Encrypted Data Set
This repository contains open-source libraries and tools to perform fully homomorphic encryption (FHE) operations on an encrypted data set. About …