Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like …
Microsoft heads to court to take on imposter, homoglyph domains
Microsoft has turned to the court system to take down domains designed to impersonate the firm in phishing attacks. On …
Regexploit – Find Regular Expressions Which Are Vulnerable To ReDoS (Regular Expression Denial Of Service)
Find regexes which are vulnerable to Regular Expression Denial of Service (ReDoS). More info on the Doyensec blog Many default …
HP patches vulnerable driver lurking in printers for 16 years
HP has patched a severe vulnerability that has been hidden in a printer driver for 16 years. On Tuesday, SentinelLabs …
Orbitaldump – A Simple Multi-Threaded Distributed SSH Brute-Forcing Tool Written In Python
A simple multi-threaded distributed SSH brute-forcing tool written in Python. How it Works When the script is executed without the …
UK blames China for Microsoft Exchange Server hack
The UK government has formally laid the blame for the Microsoft Exchange Server cyberattack at the feet of China. On …
DNSStager – Hide Your Payload In DNS
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS. DNSStager will create …
Microsoft points the finger at Israeli spyware seller for DevilsTongue attacks
Microsoft‘s war against private exploit and offensive security sellers continues with a strike against Sourgum. On July 15, the Microsoft …
Kali-Whoami – A Privacy Tool Developed To Keep You Anonymous On Kali Linux At The Highest Level
The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly …
Toddler mobile banking malware surges across Europe
Researchers have provided a deep dive into Toddler, a new Android banking Trojan that is surging across Europe. In a …