Image: Oleksii Leonov (CC BY 2.0) The Ukrainian government said today that Russian hackers compromised a government file-sharing system as …
BugBountyScanner – A Bash Script And Docker Image For Bug Bounty Reconnaissance
A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information …
Qualcomm, Sophos ink deal to secure 5G Snapdragon PCs
Qualcomm has signed up Sophos to provide cybersecurity solutions for the next wave of 5G-enabled PCs. Announced on Tuesday, the …
How To Fix Your Hacked JoomlaSite?
The fact that Joomla has plenty of powerful in-built features make it one of the most used CMS to create …
RAT-el – An Open Source Penetration Test Tool That Allows You To Take Control Of A Windows Machine
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works …
Powerhouse VPN products can be abused for large-scale DDoS attacks
Botnet operators are abusing VPN servers from VPN provider Powerhouse Management as a way to bounce and amplify junk traffic …
Horusec – An Open Source Tool That Improves Identification Of Vulnerabilities In Your Project With Just One Command
Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, …
PE-Packer – A Simple Windows X86 PE File Packer Written In C And Microsoft Assembly
PE-Packer is a simple packer for Windows PE files. The new PE file after packing can obstruct the process of …
Microsoft says SolarWinds hackers downloaded some Azure, Exchange, and Intune source code
Image: Microsoft Microsoft’s security team said today it has formally completed its investigation into its SolarWinds-related breach and found no …
DirDar – A Tool That Searches For (403-Forbidden) Directories To Break It And Get Dir Listing On It
bypass forbidden directories – find and identify dir listing – you can use it as directory brute-forcer as well Compatabily …