_______ _______ _ ______ _______ ( ____ \( ____ \( ( /|( __ \ ( ____ )| ( \/| ( …
PuzzleMaker attacks exploit Windows zero-day, Chrome vulnerabilities
Researchers say zero-day vulnerabilities fixed in Microsoft’s recent Patch Tuesday round have been used in targeted attacks against the enterprise. …
Nebula – Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS
Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is build with modules for each provider and each …
Feds strike Slilpp, a marketplace for flogging initial access credentials
Law enforcement has seized one of the largest marketplaces for selling stolen account credentials. The website’s infrastructure has been taken …
Interactsh – An OOB Interaction Gathering Server And Client Library
Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external …
Card Broken: 1000 arrests made in Chinese crackdown on fraud, cryptocurrency laundering
Chinese law enforcement has made over 1,100 arrests in a nationwide crackdown on telecoms and banking fraud. The Ministry of …
Neurax – A Framework For Constructing Self-Spreading Binaries
A framework that aids in creation of self-spreading software Requirements go get -u github.com/redcode-labs/Coldfire go get -u github.com/yelinaung/go-haikunator New in …
Amazon data usage to feature in new UK antitrust probe: report
Amazon‘s data practices are to become subject to UK scrutiny in a new antitrust probe planned by regulators. Amazon Business …
SharpWebServer – HTTP And WebDAV Server With Net-NTLM Hashes Capture Functionality
A Red Team oriented simple HTTP & WebDAV server written in C# with functionality to capture Net-NTLM hashes. To be …
Apple pays millions of dollars to student after repair staff leak her explicit photos online
Apple has agreed to a multi-million dollar settlement to resolve a lawsuit with a woman whose explicit photos were leaked …