SharpSphere gives red teamers the ability to easily interact with the guest operating systems of virtual machines managed by vCenter. …
Ursnif Trojan has targeted over 100 Italian banks
The Ursnif Trojan has been traced back to attacks against at least 100 banks in Italy. According to Avast, the …
Threatspec – Continuous Threat Modeling, Through Code
Threatspec is an open source project that aims to close the gap between development and security by bringing the threat …
ObliqueRAT Trojan now lurks in images on compromised websites
Cyberattackers behind ObliqueRAT campaigns are now disguising the Trojan in benign image files on hijacked websites. The ObliqueRAT Remote Access …
OWASP ASST (Automated Software Security Toolkit) – A Novel Open Source Web Security Scanner
OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security Scanner. Note: AWSS is the older name …
Hackers exploit websites to give them excellent SEO before deploying malware
Cyberattackers have turned to search engine optimization (SEO) techniques to deploy malware payloads to as many victims as possible. ZDNet …
StandIn – A Small .NET35/45 AD Post-Exploitation Toolkit
StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution …
Ransomware: The Types of and How to Make Ransomware?
How to Make Ransomware? Ransomware is a type of malware that operates by either locking you out of your computer …
Gargamel – A Forensic Evidence Acquirer
A Forensic Evidence Acquirer Compile Assuming you have Rust 1.41+ installed. Open terminal in the project directory and to compile …
Go malware is now common, having been adopted by both APTs and e-crime groups
The number of malware strains coded in the Go programming language has seen a sharp increase of around 2,000% over …