Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover, or office.com login page. Usage o365enum will read usernames from the …
Bitcoin wallet update trick has netted criminals more than $22 million
A simple technique has helped cybercrime gangs steal more than $22 million in user funds from users of the Electrum wallet app; …
Gitjacker – Leak Git Repositories From Misconfigured Websites
Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will …
Five Eyes governments, India, and Japan make new call for encryption backdoors
Five Eyes cyber panel at CYBERUK 19 Image: ZDNet/CBSi Special feature Cyberwar and the Future of Cybersecurity Today’s security threats …
Google Cloud kicks out Proud Boys websites
Image: ZDNet Proud Boys, a far-right neo-fascist extremist group, has been kicked off Google Cloud on Thursday, and the organization …
SwiftBelt – A macOS Enumeration Tool Inspired By Harmjoy’S Windows-based Seatbelt Enumeration Tool
SwiftBelt is a macOS enumerator inspired by @harmjoy’s Windows-based Seatbelt enumeration tool. SwiftBelt does not utilize any command line utilities …
NashaVM – A Virtual Machine For .NET Files And Its Runtime Was Made In C++/CLI
Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI Installation git clone https://github.com/Mrakovic-ORG/NashaVM –recursecd …
German tech giant Software AG down after ransomware attack
Image: Software AG Software AG, one of the largest software companies in the world, has suffered a ransomware attack over …
C41N – An Automated Rogue Access Point Setup Tool
c41n is an automated Rogue Access Point setup tool. c41n provides automated setup of several types of Rogue Access Points, …
Waterbear malware used in attack wave against government agencies
Researchers have spotted a fresh Waterbear campaign in which Taiwanese government agencies have been targeted in sophisticated attacks. According to …