Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will …
Five Eyes governments, India, and Japan make new call for encryption backdoors
Five Eyes cyber panel at CYBERUK 19 Image: ZDNet/CBSi Special feature Cyberwar and the Future of Cybersecurity Today’s security threats …
Google Cloud kicks out Proud Boys websites
Image: ZDNet Proud Boys, a far-right neo-fascist extremist group, has been kicked off Google Cloud on Thursday, and the organization …
SwiftBelt – A macOS Enumeration Tool Inspired By Harmjoy’S Windows-based Seatbelt Enumeration Tool
SwiftBelt is a macOS enumerator inspired by @harmjoy’s Windows-based Seatbelt enumeration tool. SwiftBelt does not utilize any command line utilities …
NashaVM – A Virtual Machine For .NET Files And Its Runtime Was Made In C++/CLI
Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI Installation git clone https://github.com/Mrakovic-ORG/NashaVM –recursecd …
German tech giant Software AG down after ransomware attack
Image: Software AG Software AG, one of the largest software companies in the world, has suffered a ransomware attack over …
C41N – An Automated Rogue Access Point Setup Tool
c41n is an automated Rogue Access Point setup tool. c41n provides automated setup of several types of Rogue Access Points, …
Waterbear malware used in attack wave against government agencies
Researchers have spotted a fresh Waterbear campaign in which Taiwanese government agencies have been targeted in sophisticated attacks. According to …
iOS Application Pentesting Series Vapra Shiksha
Time: Oct 10, 2020 04:00 PMDescription: It will cover the penetration testing of iOS applications. Start from basic pentesting to …
CSRFER – Tool To Generate CSRF Payloads Based On Vulnerable Requests
CSRFER is a tool to generate csrf payloads, based on vulnerable requests. It parses supplied requests to generate either a …