An open source implementation of the grantor role in Apple’s Wi-Fi Password Sharing protocol. Disclaimer OpenWifiPass is experimental software and …
This chart shows the connections between cybercrime groups
Cybersecurity reports often talk about threat actors and their malware/hacking operations as self-standing events, but, in reality, the cybercrime ecosystem …
Kali Linux 2021.1 – Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2021.1. This release has various impressive updates. The summary of the changelog …
Ukraine reports cyber-attack on government document management system
Image: Oleksii Leonov (CC BY 2.0) The Ukrainian government said today that Russian hackers compromised a government file-sharing system as …
BugBountyScanner – A Bash Script And Docker Image For Bug Bounty Reconnaissance
A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information …
Qualcomm, Sophos ink deal to secure 5G Snapdragon PCs
Qualcomm has signed up Sophos to provide cybersecurity solutions for the next wave of 5G-enabled PCs. Announced on Tuesday, the …
How To Fix Your Hacked JoomlaSite?
The fact that Joomla has plenty of powerful in-built features make it one of the most used CMS to create …
RAT-el – An Open Source Penetration Test Tool That Allows You To Take Control Of A Windows Machine
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works …
Powerhouse VPN products can be abused for large-scale DDoS attacks
Botnet operators are abusing VPN servers from VPN provider Powerhouse Management as a way to bounce and amplify junk traffic …
Horusec – An Open Source Tool That Improves Identification Of Vulnerabilities In Your Project With Just One Command
Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, …