Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI Installation git clone https://github.com/Mrakovic-ORG/NashaVM –recursecd …
German tech giant Software AG down after ransomware attack
Image: Software AG Software AG, one of the largest software companies in the world, has suffered a ransomware attack over …
C41N – An Automated Rogue Access Point Setup Tool
c41n is an automated Rogue Access Point setup tool. c41n provides automated setup of several types of Rogue Access Points, …
Waterbear malware used in attack wave against government agencies
Researchers have spotted a fresh Waterbear campaign in which Taiwanese government agencies have been targeted in sophisticated attacks. According to …
iOS Application Pentesting Series Vapra Shiksha
Time: Oct 10, 2020 04:00 PMDescription: It will cover the penetration testing of iOS applications. Start from basic pentesting to …
CSRFER – Tool To Generate CSRF Payloads Based On Vulnerable Requests
CSRFER is a tool to generate csrf payloads, based on vulnerable requests. It parses supplied requests to generate either a …
UK Department For Education fails to meet UK, GDPR data protection standards – with flying colors
A compulsory audit at the UK Department For Education (DFE) has exposed a quagmire of confusion and failures in managing …
Lockphish – The First Tool For Phishing Attacks On The Lock Screen, Designed To Grab Windows Credentials, Android PIN And iPhone Passcode
Lockphish it’s the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN …
New HEH botnet can wipe routers and IoT devices
Image: Netlab A newly discovered botnet contains code that can wipe all data from infected systems, such as routers, servers, …
Kube-Score – Kubernetes Object Analysis With Recommendations For Improved Reliability And Security
kube-score is a tool that performs static code analysis of your Kubernetes object definitions. The output is a list of …