Linux Privilege Escalation through SUDO abuse.If you like the tool and for my personal motivation so as to develop other …
Coronavirus kills MWC, IBM withdraws from RSA: What about Kaspersky’s Security Analyst Summit?
The new novel coronavirus, formally known as COVID-19, has caused severe disruption to the technology industry and annual events, leading …
Metabigor – Intelligence Tool But Without API Key
Intelligence Tool but without API key What is Metabigor?Metabigor is Intelligence tool, its goal is to do OSINT tasks and …
0L4Bs – Cross-site Scripting Labs For Web Application Security Enthusiasts
Cross-site scripting labs for web application security enthusiastsList of Chall : ~ Chall 1 | URL ~ Chall 2 | …
Hackers exploit zero-day in WordPress plugin to create rogue admin accounts
Image: ZDNet, WordPress techrepublic cheat sheet Hackers are exploiting a zero-day vulnerability in a WordPress plugin made by ThemeREX, a …
Ring to enable 2FA for all user accounts after recent hacks
Image: Ring Security camera vendor Ring announced today plans to forcibly enable two-factor authentication (2FA) for all user accounts. Prior …
NekoBot – Auto Exploiter With 500+ Exploit 2000+ Shell
NekoBotV1 | Auto Exploiter With 500+ Exploit 2000+ ShellFeatures :[+] WordPress : 1- Cherry-Plugin 2- download-manager Plugin 3- wysija-newsletters 4- …
DrSemu – Malware Detection And Classification Tool Based On Dynamic Behavior
Dr.Semu runs executables in an isolated environment, monitors the behavior of a process, and based on Dr.Semu rules created by …
Israeli soldiers tricked into installing malware by Hamas agents posing as women
Image: IDF Members of the Hamas Palestinian militant group have posed as young teenage girls to lure Israeli soldiers into …
Manul – A Coverage-Guided Parallel Fuzzer For Open-Source And Blackbox Binaries On Windows, Linux And MacOS
Manul is a coverage-guided parallel fuzzer for open-source and black-box binaries on Windows, Linux and macOS (beta) written in pure …