StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution …
Ransomware: The Types of and How to Make Ransomware?
How to Make Ransomware? Ransomware is a type of malware that operates by either locking you out of your computer …
Gargamel – A Forensic Evidence Acquirer
A Forensic Evidence Acquirer Compile Assuming you have Rust 1.41+ installed. Open terminal in the project directory and to compile …
Go malware is now common, having been adopted by both APTs and e-crime groups
The number of malware strains coded in the Go programming language has seen a sharp increase of around 2,000% over …
Gatekeeper – First Open-Source DDoS Protection System
Gatekeeper is the first open source DoS protection system. It is designed to scale to any peak bandwidth, so it …
Chrome will soon try HTTPS first when you type an incomplete URL
Image: Google Google engineers have been some of the most ardent promoters of browser security features over the past few …
Berlin resident jailed for threatening to bomb NHS hospital unless Bitcoin ransom was paid
A Berlin resident has been found guilty of threatening to bomb a hospital and attempting to blackmail the UK’s National …
OpenWifiPass – An Open Source Implementation Of Apple’s Wi-Fi Password Sharing Protocol In Python
An open source implementation of the grantor role in Apple’s Wi-Fi Password Sharing protocol. Disclaimer OpenWifiPass is experimental software and …
This chart shows the connections between cybercrime groups
Cybersecurity reports often talk about threat actors and their malware/hacking operations as self-standing events, but, in reality, the cybercrime ecosystem …
Kali Linux 2021.1 – Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2021.1. This release has various impressive updates. The summary of the changelog …