An open-source Go project to test different web application firewalls (WAF) for detection logic and bypasses. How it works It …
Critical Zoom vulnerability triggers remote code execution without user input
A zero-day vulnerability in Zoom which can be used to launch remote code execution (RCE) attacks has been disclosed by …
PoisonApple – macOS Persistence Tool
Command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters …
Max – Maximizing BloodHound
Maximizing BloodHound. Description New Release: dpat – The BloodHound Domain Password Audit Tool (DPAT) A simple suite of tools: get-info …
Facebook tackles deepfake spread and troll farms in latest moderation push
Facebook has removed a troll farm, spreaders of misinformation, and creators of deepfake images in its latest moderation efforts. The …
Columbo – A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down …
Man jailed for trying to buy chemical weapon online able to kill ‘hundreds’ of people
A man has been jailed for trying to buy a chemical weapon online capable of killing “hundreds” of people. On …
Burpsuite-Copy-As-XMLHttpRequest – Copy As XMLHttpRequest BurpSuite Extension
The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript’s XmlHttpRequest, which simplifies …
SAP issues advisory on the exploit of old vulnerabilities to target enterprise applications
Researchers have warned that critical vulnerabilities in unpatched SAP applications are being widely exploited by cyberattackers worldwide. On Tuesday, SAP …
US charges close to 500 individuals for COVID-19 fraud, criminal activity
The US Department of Justice (DoJ) has charged 474 individuals for participating in COVID-19 scams and fraudulent activity. To some …