UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection …
How To Remove Ransomware From Android Phone Easily?
For many people, ransomware is a hack attack on computer devices, not mobile phones. This is far from the truth. …
SharpHound3 – C# Data Collector For The BloodHound Project
Get SharpHound The latest build of SharpHound will always be in the BloodHound repository here Compile Instructions SharpHound is written …
Panasonic, McAfee team up to tackle vehicle cybersecurity
Panasonic and McAfee are joining forces to establish a vehicle security operations center (SOC) to tackle the ongoing threat of …
Whistleblower claims Ubiquiti Networks data breach was ‘catastrophic’
A whistleblower involved in the response to a data breach suffered by Ubiquiti Networks has claimed the incident was downplayed …
DefenderCheck – Identifies The Bytes That Microsoft Defender Flags On
Quick tool to help make evasion work a little bit easier. Takes a binary as input and splits it until …
VMware patches critical vRealize Operations platform vulnerabilities
VMware has patched a pair of severe vulnerabilities that could lead to the theft of administrator credentials in vRealize. vRealize …
Tuf – A Framework For Securing Software Update Systems
This repository is the reference implementation of The Update Framework (TUF). It is written in Python and intended to conform …
SharpDPAPI – A C# Port Of Some Mimikatz DPAPI Functionality
SharpDPAPI is a C# port of some DPAPI functionality from @gentilkiwi‘s Mimikatz project. I did not come up with this …
DeepDotWeb dark web admin pleads guilty to gun, drug purchase kickbacks
An administrator for the DeepDotWeb (DDW) portal has pleaded guilty to receiving kickbacks for connecting buyers and sellers of illegal …