A former intelligence analyst for the US Federal Bureau of Investigation (FBI) has been indicted for stealing confidential files over …
slopShell – The Only Php Webshell You Need
php webshell Since I derped, and forgot to talk about usage. Here goes. For this shell to work, you need …
Russian dark web marketplace Hydra cryptocurrency transactions reached $1.37bn in 2020
An investigation into the Hydra marketplace has revealed surging transaction volumes and a thriving — albeit illicit — cryptocurrency ecosystem. …
AnalyticsRelationships – Get Related Domains / Subdomains By Looking At Google Analytics IDs
Python/GO versions > By @JosueEncinar ">” name=”twitter:description”> Python/GO versions > By @JosueEncinar ">” name=”description”> Python/GO versions > By @JosueEncinar ">” …
Iranian hacking group Agrius pretends to encrypt files for a ransom, destroys them instead
The Agrius hacking group has shifted from using purely destructive wiper malware to a combination of wiper and ransomware functionality …
What to do after a Ransomware Attack?
What do you do when you wake up one morning and realise that your log in credentials into your system …
FireStorePwn – Firestore Database Vulnerability Scanner Using APKs
fsp scans an APK and checks the Firestore database for rules that are not secure, testing with or without authentication. …
Russian national jailed for running stolen data, hijacked account seller platform deer.io
A Russian national has been jailed for 2.5 years for operating deer.io, a platform designed for the sale of stolen …
Qvm-Create-Windows-Qube – Spin Up New Windows Qubes Quickly, Effortlessly And Securely
qvm-create-windows-qube is a tool for quickly and conveniently installing fresh new Windows qubes with Qubes Windows Tools (QWT) drivers automatically. …
Bluetooth bugs open the door for attackers to impersonate devices
Threat actors could exploit vulnerabilities in the Bluetooth Core and Mesh specifications to impersonate devices during pairing, paving the way …