A TCP tunneling suite built with golang and gRPC. gTunnel can manage multiple forward and reverse tunnels that are all …
Black Hat: Hackers can remotely hijack enterprise, healthcare Temi robots
Robots used in hospitals and care homes to assist patients and the vulnerable can be fully hijacked by cyberattackers. Black …
UEFI_RETool – A Tool For UEFI Firmware Reverse Engineering
A tool for UEFI firmware reverse engineering. UEFI firmware analysis with uefi_retool.py scriptUsage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to …
Cluster of 295 Chrome extensions caught hijacking Google and Bing search results
More than 80 million Chrome users have installed one of 295 Chrome extensions that hijack and insert ads inside Google …
DLInjector-GUI – DLL Injector Graphical User Interface
DLInjector for Graphical User Interface.Faster DLL Injector for processes. It targets the process name to identify the target. The process …
Ransomware gang publishes tens of GBs of internal data from LG and Xerox
Image: LG, Simone Hutsch, ZDNet The operators of the Maze ransomware have published today tens of GB of internal data …
Cnitch – Container Snitch Checks Running Processes Under The Docker Engine And Alerts If Any Are Found To Be Running As Root
cnitch (snitch or container snitch) is a simple framework and command line tool for monitoring Docker containers to identify any …
How To Set Your Phone for Better Privacy and Security?
The default factory settings on your phone are a double-edged sword. On one hand, they’re the best way to see …
GandCrab ransomware distributor arrested in Belarus
In a press release last week, the Minister of Internal Affairs of Belarus announced the arrest of a 31-year-old man …
DeimosC2 – A Golang Command And Control Framework For Post-Exploitation
DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that …