Simple python script to check against hypothetical JWT vulnerability. Let’s say there is an application that uses JWT tokens signed …
US and Bulgarian authorities disrupt NetWalker ransomware operation
Image: McAfee, ZDNet Law enforcement agencies from Bulgaria and the US have disrupted this week the infrastructure of NetWalker, one …
Emba – An Analyzer For Linux-based Firmware Of Embedded Devices
emba is being developed as a firmware scanner that analyses already-extracted Linux-based firmware images. It should help you to identify …
10-years-old Sudo bug lets Linux users gain root-level access
A major vulnerability impacting a large chunk of the Linux ecosystem has been patched today in Sudo, an app that …
Batea – AI-based, Context-Driven Network Device Ranking
Batea is a context-driven network device ranking framework based on the anomaly detection family of machine learning algorithms. The goal …
Google: North Korean hackers have targeted security researchers via social media
Group of hooded hackers shining through a digital north korean flag cybersecurity concept Michael Borgers, Getty Images/iStockphoto Google said today …
Shellex – C-shellcode To Hex Converter, Handy Tool For Paste And Execute Shellcodes In Gdb, Windbg, Radare2, Ollydbg, X64Dbg, Immunity Debugger And 010 Editor
C-shellcode to hex converter. Handy tool for paste & execute shellcodes in gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & …
WSuspicious – A Tool To Abuse Insecure WSUS Connections For Privilege Escalations
This is a proof of concept program to escalate privileges on a Windows host by abusing WSUS. Details in this …
Hacker leaks data of 2.28 million dating site users
Image: ZDNet A well-known hacker has leaked this week the details of more than 2.28 million users registered on MeetMindful.com, a …
Xnuspy – An iOS Kernel Function Hooking Framework For Checkra1N’Able Devices
Output from the kernel log after compiling and running example/open1_hook.c xnuspy is a pongoOS module which installs a new system …