An online database left exposed online without a password has leaked the personal details of hundreds of thousands of users …
HTTP-revshell – Powershell Reverse Shell Using HTTP/S Protocol With AMSI Bypass And Proxy Aware
HTTP-revshell is a tool focused on redteam exercises and pentesters. This tool provides a reverse connection through the http/s protocol. …
MZAP – Multiple Target ZAP Scanning
Multiple target ZAP Scanning / mzap is a tool for scanning N*N in ZAP. Concept Installation go-get $ go get …
Researcher kept a major Bitcoin bug secret for two years to prevent attacks
In 2018, a security researcher discovered a major vulnerability in Bitcoin Core, the software that powers the Bitcoin blockchain, but …
Porn site users targeted with malicious ads redirecting to exploit kits, malware
Image: Devin Edwards A cybercrime group has been busy over the past months placing malicious ads on adult-themed websites in …
Avcleaner – C/C++ Source Obfuscator For Antivirus Bypass
C/C++ source obfuscator for antivirus bypass.Build docker build . -t avcleaner docker run -v ~/dev/scrt/avcleaner:/home/toto -it avcleaner bash #adapt ~/dev/scrt/avcleaner …
Ransomware accounted for 41% of all cyber insurance claims in H1 2020
Image: Coalition Ransomware incidents have accounted for 41% of cyber insurance claims filed in the first half of 2020, according …
Safety – Check Your Installed Dependencies For Known Security Vulnerabilities
Safety checks your installed dependencies for known security vulnerabilities.By default it uses the open Python vulnerability database Safety DB, but …
Rakkess – Kubectl Plugin To Show An Access Matrix For K8S Server Resources
Review Access – kubectl plugin to show an access matrix for server resources IntroHave you ever wondered what access rights …
Weave Scope is now being exploited in attacks against cloud environments
TeamTNT has added the legitimate Weave Scope software to its attack toolkit in the quest to infiltrate cloud environments. According …