Most of the people store all their files in physical storage devices like pen-drives, hard-disks, memory cards, etc. Due to …
Europol arrests man for coronavirus business email scam peddling masks, sanitizer
Europol has arrested a man for allegedly attempting to launder cash generated from a business email scam (BEC) connected to …
DNSteal v2.0 – DNS Exfiltration Tool For Stealthily Sending Files Over DNS Requests
This is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests.Below …
DarkHotel hackers use VPN zero-day to breach Chinese government agencies
Image: Qihoo 360, ZDNet Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and …
Angrgdb – Use Angr Inside GDB – Create An Angr State From The Current Debugger State
Use angr inside GDB. Create an angr state from the current debugger state. Install pip install angrgdb echo “python import …
Docker servers targeted by new Kinsing malware campaign
Image: Aqua For the past few months, a malware operation has been scanning the internet for Docker servers running API …
HikPwn – A Simple Scanner For Hikvision Devices
HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. This project was born …
Comparing Two of the Best VPNs: Nord Vs Express
Chances are, you’re working from home as a result of the COVID-19 pandemic and the call for social distancing. This …
12k+ Android apps contain master passwords, secret access keys, secret commands
A comprehensive academic study published this week has discovered hidden backdoor-like behavior — such as secret access keys, master passwords, …
Tweetshell – Multi-thread Twitter BruteForcer In Shell Script
Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter, this script can bypass login limiting and …