Image: Maria Teneva Malware authors have managed to pass malicious apps through the Apple app notarization process for the second …
NoSQLi – NoSql Injection CLI Tool
NoSQL scanner and injector. About Nosqli I wanted a better nosql injection tool that was simple to use, fully command …
US Treasury sanctions Russian research institute behind Triton malware
CNIIHM, Moscow Image: Google Maps The US Treasury Department announced sanctions today against a Russian research institute for its role …
Mutation Engine For Fun And Profit
Time: Oct 24, 2020 05:30 PMDescription: Topics to be Covered: Types of mutations Pros and cons of different types of …
FBI, CISA: Russian hackers breached US government networks, exfiltrated data
The US government said today that a Russian state-sponsored hacking group has targeted and successfully breached US government networks. Government …
Oregami – IDA Plugins And Scripts For Analyzing Register Usage Frame
“”” What is this register used for?Hmm.. I’ll just rename it to veryuniquename, do a textual search, and find all …
US blames Iran for spoofed Proud Boys emails threatening Democrat voters
Image: Proofpoint In a short press conference held today by the US Department of Justice, high-ranking officials with the US …
MalwareSourceCode – Collection Of Malware Source Code For A Variety Of Platforms In An Array Of Different Programming Languages
Malware Source Code Collection !!! DISCLAIMER !!! We do not take any responsibility for any damage done by the code …
Zap-Hud – The OWASP ZAP Heads Up Display (HUD)
The HUD is new interface that provides the functionality of ZAP directly in the browser. Learn more: Using the HUD …
Google releases Chrome security update to patch actively exploited zero-day
Google has released Chrome version 86.0.4240.111 earlier today to deploy security fixes, including a patch for an actively exploited zero-day vulnerability. The …