Command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters …
Max – Maximizing BloodHound
Maximizing BloodHound. Description New Release: dpat – The BloodHound Domain Password Audit Tool (DPAT) A simple suite of tools: get-info …
Facebook tackles deepfake spread and troll farms in latest moderation push
Facebook has removed a troll farm, spreaders of misinformation, and creators of deepfake images in its latest moderation efforts. The …
Columbo – A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down …
Man jailed for trying to buy chemical weapon online able to kill ‘hundreds’ of people
A man has been jailed for trying to buy a chemical weapon online capable of killing “hundreds” of people. On …
Burpsuite-Copy-As-XMLHttpRequest – Copy As XMLHttpRequest BurpSuite Extension
The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript’s XmlHttpRequest, which simplifies …
SAP issues advisory on the exploit of old vulnerabilities to target enterprise applications
Researchers have warned that critical vulnerabilities in unpatched SAP applications are being widely exploited by cyberattackers worldwide. On Tuesday, SAP …
US charges close to 500 individuals for COVID-19 fraud, criminal activity
The US Department of Justice (DoJ) has charged 474 individuals for participating in COVID-19 scams and fraudulent activity. To some …
UAC – Unix-like Artifacts Collector
UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection …
How To Remove Ransomware From Android Phone Easily?
For many people, ransomware is a hack attack on computer devices, not mobile phones. This is far from the truth. …