A Linux backdoor recently discovered by researchers has avoided VirusTotal detection since 2018. Dubbed RotaJakiro, the Linux malware has been …
Vaf – Very Advanced (Web) Fuzzer
very advanced fuzzer compiling Install nim from nim-lang.org Run nimble build A vaf.exe file will be created in your directory …
ISC urges updates of DNS servers to wipe out new BIND vulnerabilities
The Internet Systems Consortium (ISC) has released an advisory outlining a trio of vulnerabilities that could impact the safety of …
SAP admits to ‘thousands’ of illegal software exports to Iran
SAP has reached a settlement with US investigators to close a prosecution relating to the violation of economic sanctions and …
MeterPwrShell – Automated Tool That Generate The Perfect Powershell Payload
Automated Tool That Generate A Powershell Oneliner That Can Create Meterpreter Shell On Metasploit,Bypass AMSI,Bypass Firewall,Bypass UAC,And Bypass Any AVs. …
How to get rid of Ransomware Attacks?
The importance of accessibility and protection of personal information can never be overstated especially when it comes to online dealings. …
Paleohacks data leak exposes customer records, password reset tokens
A popular online resource for paleo recipes and tips was the source of a data leak impacting roughly 70,000 users. …
PwnLnX – An Advanced Multi-Threaded, Multi-Client Python Reverse Shell For Hacking Linux Systems
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There’s still more work to do so feel free …
Microsoft mulls over tweaks to threat data, code-sharing scheme following Exchange Server debacle
Microsoft is reportedly considering revisions to a threat and vulnerability sharing program suspected of being a key factor in widespread …
Fav-Up – IP Lookup By Favicon Using Shodan
Lookups for real IP starting from the favicon icon and using Shodan. Installation pip3 install -r requirements.txt Shodan API key …