BLACK HAT USA: When a company becomes the victim of a cyberattack, executives are faced with a tsunami of challenges: …
Elpscrk – An Intelligent Common User-Password Profiler Based On Permutations And Statistics
An Intelligent common user-password profiler that’s named after the same tool in Mr.Robot series S01E01 In simple words, elpscrk will …
There’s been a rise in stalkerware. And the tech abuse problem goes beyond smartphones
BLACK HAT USA: We need to be wary of mobile devices and IoT products, now widely abused to facilitate partner …
The Graph Foundation launches bug bounty program
The Graph Foundation has launched a bug bounty program promising rewards of up to $2.5 million for smart contract vulnerabilities. …
SharpLAPS – Retrieve LAPS Password From LDAP
The attribute ms-mcs-AdmPwd stores the clear-text LAPS password. This executable is made to be executed within Cobalt Strike session using …
Raccoon stealer-as-a-service will now try to grab your cryptocurrency
Raccoon Stealer has been upgraded by its developer in order to steal cryptocurrency alongside financial information. On Tuesday, Sophos released …
Rz-Ghidra – Deep Ghidra Decompiler And Sleigh Disassembler Integration For Rizin
This is an integration of the Ghidra decompiler and Sleigh Disassembler for rizin. It is solely based on the decompiler …
PowerShellArmoury – A PowerShell Armoury For Security Guys And Girls
The PowerShell Armoury is meant for pentesters, “insert-color-here”-teamers and everyone else who uses a variety of PowerShell tools during their …
Ransomware operators love them: Key trends in the Initial Access Broker space
The Initial Access Broker market continues to expand, with fees a drop in the ocean in comparison to the potential …
Security Experts Tie Covert Wiper Tool to Iranian Railway Infrastructure Hacking Attempt
Security experts at SentinelOne have come across a previously unidentified data-scrubbing malware tool that was a portion of an uncontrollable …