\ \ / / _ \/ ___| ___| | ___ _ \ \ /\ / /| |_) \___ \ / _ \ |/ …
Malaysia Telco Hack – Corporations Spill 46 Million Records
The Malaysia Telco Hack has been blowing up in the news with over 46 Million Records being leaked including IMEI …
WAFNinja – Web Application Firewall Attack Tool – WAF Bypass
WAFNinja is a Python-based Web Application Firewall Attack Tool designed to help penetration testers execute WAF bypass by automating the …
dirsearch – Website Directory Scanner For Files & Structure
dirsearch is a Python-based command-line website directory scanner designed to brute force site structure including directories and files in websites. …
India among the target nations for cyber attack: CERT
A new cyber threat targeting Internet-connected devices is spreading rapidly and could enable hackers to identify vulnerabilities and access users’ …
Metasploit Can Be Directly Used For Hardware Penetration Testing Now
Security researchers and penetration testers have used the open source Metasploit Framework to probe for vulnerabilities, run exploits, and simulate …
Malicious Payload Evasion Techniques with Advanced Exploitation Frameworks
Sophisticated threats are Evolving with much more advanced capabilities and give more pain for analysis even evade the advanced security software such …
Bad Rabbit Ransomware hits Ukraine and Russia
A number of State Institutions of Ukraine and Russia were attacked on Tuesday, October 24, by a new ransomware Bad …
Email Header Analysis – Received Email is Genuine or Spoofed
Email is a business critical asset.Altering email header to make the message appear to come from somewhere other than the …
Reaper botnet leverages millions of IoT devices
Just in time for Halloween, a growing hacked device botnet named “Reaper” could put the internet in the dark. “Botnets” …