Information belonging to 553 million Facebook users has been posted online in an incident the company says was due to …
Dwn – D(Ockerp)Wn – A Docker Pwn Tool Manager
dwn is a “docker-compose for hackers”. Using a simple YAML “plan” format similar to docker-compose, image names, versions and volume …
Vyveva: Lazarus hacking group’s latest weapon strikes South African freight
Researchers have discovered a new backdoor employed by the Lazarus hacking group in targeted attacks against the freight industry. On …
Cpufetch – Simplistic Yet Fancy CPU Architecture Fetching Tool
Simplistic yet fancy CPU architecture fetching tool 1. Support cpufetch currently supports x86_64 CPUs (both Intel and AMD) and ARM. …
Italian man arrested after allegedly paying hitman in cryptocurrency
An Italian man has been arrested on suspicion of paying a hitman to assassinate his former partner. According to a …
Washington State educational organizations targeted in cryptojacking spree
US educational organizations are being targeted by threat actors intent on compromising their networks to covertly mine cryptocurrency. Otherwise known …
Gotestwaf – Go Test WAF Is A Tool To Test Your WAF Detection Capabilities Against Different Types Of Attacks And By-Pass Techniques
An open-source Go project to test different web application firewalls (WAF) for detection logic and bypasses. How it works It …
Critical Zoom vulnerability triggers remote code execution without user input
A zero-day vulnerability in Zoom which can be used to launch remote code execution (RCE) attacks has been disclosed by …
PoisonApple – macOS Persistence Tool
Command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters …
Max – Maximizing BloodHound
Maximizing BloodHound. Description New Release: dpat – The BloodHound Domain Password Audit Tool (DPAT) A simple suite of tools: get-info …