A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Features Scan the contents …
Adware found in 21 Android apps with more than 7 million downloads
Google has removed 15 of 21 Android applications from the official Play Store over the weekend following a report from …
Hacker steals $24 million from cryptocurrency service ‘Harvest Finance’
A hacker has stolen roughly $24 million worth of cryptocurrency assets from decentralized finance (DeFi) service Harvest Finance, a web portal …
JWT-Hack – Tool To En/Decoding JWT, Generate Payload For JWT Attack And Very Fast Cracking(Dict/Brutefoce)
jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and …
CobaltStrikeScan – Scan Files Or Process Memory For CobaltStrike Beacons And Parse Their Configuration
Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence …
Phishing groups are collecting user data, email and banking passwords via fake voter registration forms
Image: Proofpoint Days ahead of the US Presidential Election, spam groups are hurrying to strike the iron while it’s still …
Pesidious – Malware Mutation Using Reinforcement Learning And Generative Adversarial Networks
Malware Mutation using Deep Reinforcement Learning and GANs The purpose of the tool is to use artificial intelligence to mutate …
Apple notarizes six malicious apps posing as Flash installers
Image: Maria Teneva Malware authors have managed to pass malicious apps through the Apple app notarization process for the second …
NoSQLi – NoSql Injection CLI Tool
NoSQL scanner and injector. About Nosqli I wanted a better nosql injection tool that was simple to use, fully command …
US Treasury sanctions Russian research institute behind Triton malware
CNIIHM, Moscow Image: Google Maps The US Treasury Department announced sanctions today against a Russian research institute for its role …