In this malware, are used some techniques to try bypass the AVs, VMs, and Sandboxes, with only porpuse to learning …
G Suite Marketplace primed for a privacy scandal, researchers warn
Image: ZDNet In research presented last month, security researchers said that many of the apps listed on the G Suite …
Enumy – Linux Post Exploitation Privilege Escalation Enumeration
Enumy is portable executable that you drop on target Linux machine during a pentest or CTF in the post exploitation …
Researcher lands $100,000 reward for ‘Sign in with Apple’ authentication bypass bug
Apple has awarded a bug bounty hunter $100,000 for finding and reporting a severe security issue that could lead to …
Hacker leaks database of dark web hosting provider
Image: ZDNet (provided) A hacker has leaked online today the database of Daniel’s Hosting (DH), the largest free web hosting …
ADCollector – A Lightweight Tool To Quickly Extract Valuable Information From The Active Directory Environment For Both Attacking And Defending
ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you …
DroidFiles – Get Files From Android Directories
Get files from Android directories, internal and external storage (Pictures, Downloads, Whatsapp, Videos, …)Legal disclaimer:Usage of DroidFiles for attacking targets …
NCA launches UK ad campaign to divert kids searching for cybercrime tools
The UK’s National Crime Agency (NCA) has launched a new advertising campaign designed to divert young people searching for cybercrime …
Top 5 Effective Ways of Dealing with Cyber Bullying
Due to an increase in internet usage, many people can access the internet. Cyber is considered a crime. Most people …
Judge demands Capital One release Mandiant cyberforensic report on data breach
A judge has ruled that Capital One must release the forensic report prepared by Mandiant following a data breach, of …