jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and …
CobaltStrikeScan – Scan Files Or Process Memory For CobaltStrike Beacons And Parse Their Configuration
Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence …
Phishing groups are collecting user data, email and banking passwords via fake voter registration forms
Image: Proofpoint Days ahead of the US Presidential Election, spam groups are hurrying to strike the iron while it’s still …
Pesidious – Malware Mutation Using Reinforcement Learning And Generative Adversarial Networks
Malware Mutation using Deep Reinforcement Learning and GANs The purpose of the tool is to use artificial intelligence to mutate …
Apple notarizes six malicious apps posing as Flash installers
Image: Maria Teneva Malware authors have managed to pass malicious apps through the Apple app notarization process for the second …
NoSQLi – NoSql Injection CLI Tool
NoSQL scanner and injector. About Nosqli I wanted a better nosql injection tool that was simple to use, fully command …
US Treasury sanctions Russian research institute behind Triton malware
CNIIHM, Moscow Image: Google Maps The US Treasury Department announced sanctions today against a Russian research institute for its role …
Mutation Engine For Fun And Profit
Time: Oct 24, 2020 05:30 PMDescription: Topics to be Covered: Types of mutations Pros and cons of different types of …
FBI, CISA: Russian hackers breached US government networks, exfiltrated data
The US government said today that a Russian state-sponsored hacking group has targeted and successfully breached US government networks. Government …
Oregami – IDA Plugins And Scripts For Analyzing Register Usage Frame
“”” What is this register used for?Hmm.. I’ll just rename it to veryuniquename, do a textual search, and find all …