Invoke-DNSteal is a Simple & Customizable DNS Data Exfiltrator. This tool helps you to exfiltrate data through DNS protocol over …
Microsoft reveals authentication failures, system hijack vulnerabilities in Netgear routers
Microsoft has disclosed a series of vulnerabilities in Netgear routers which could lead to data leaks and full system compromise. …
Red-Shadow – Lightspin AWS IAM Vulnerability Scanner
Scan your AWS IAM Configuration for shadow admins in AWS IAM based on misconfigured deny policies not affecting users in …
GitHub bug bounties: payouts surge past $1.5 million mark
Over half a million dollars has been issued as rewards for researchers participating in GitHub’s bug bounty program over the …
S3-Account-Search – S3 Account Search
This tool lets you find the account id an S3 bucket belongs too. For this to work you need to …
New ransomware highlights widespread adoption of Golang language by cyberattackers
A new ransomware strain that utilizes Golang highlights the programming language’s increasing adoption by threat actors. CrowdStrike secured a sample …
AWS Pen-Testing Laboratory – Pentesting Lab With A Kali Linux Instance Accessible Via Ssh And Wireguard VPN And With Vulnerable Instances In A Private Subnet
PenTesting laboratory deployed as IaC with Terraform on AWS. It deploys a Kali Linux instance accessible via ssh & wireguard …
Own an old WD My Book Live? Disconnect it from the internet right now
Western Digital is urging legacy My Book owners to unplug their devices from the internet without delay following a series …
Mythic – A Collaborative, Multi-Platform, Red Teaming Framework
A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It’s designed to provide …
‘Pen tester’ FIN7 hacking group member lands seven-year prison term
A “high-level” member of FIN7 has been sentenced to a seven-year term for his role in the cybercriminal group. On …