Tutorial and Tools

Metasploit with Docker and Kubernetes

The purpose of this article is to make it easy to build a penetration test environment without any other complicated settings as long as...

Credentials for 50 thousand Fortinet VPN devices published online

Last weekend, one of the hacker forums posted exploits for a vulnerability in Fortinet VPN devices ( CVE-2018-13379 ) and the IP addresses of...

How To Use Powershell Empire

Initial setup Build a C2 server called listener ================================================================ Post-Exploitation Framework ================================================================ 2.5 | https://github.com/empireProject/Empire ================================================================ _______ .___ ___. .______ ...

Scan Open Ports With Nmap – Full Tutorial

1 What is nmap? Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to...

Mitaka – Powerful OSINT Tool on Chrome

When trying to search the IOC (Indicator of Compromise) for IP addresses, domains, hash values, etc. with OSINT services (Shodan, Censys, VirusTotal, etc.), do...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to share samples among malware researchers.Acts as...

SocialFish – Let’s Go Phishing

SocialFish is an open-source phishing tool, integrated with another open source tool – Ngrok, which allows you to easily create a phishing page of most...

Astsu – A network scanner tool

A network scanner tool, developed in Python 3 using scapy. How it works Scan common ports: Send a TCP Syn packet to the destination on the...

Latest news

Microsoft has released its own Linux distribution

This week Microsoft posted on GitHub the first stable build of its own Linux distribution,  CBL-Mariner (Common Base Linux), which was...

Microsoft has released its own Linux distribution

This week Microsoft posted on GitHub the first stable build of its own Linux distribution,  CBL-Mariner (Common Base Linux), which was...

1 TB of data stolen from oil company Saudi Aramco

Attackers stole 1 TB of confidential data from the Saudi Arabian Oil Company, the national oil company of Saudi...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

Google Chrome patches two more 0-days used in real attacks

The company Google has announced a new release of...

Windows XP Source Code: It works!

A couple of days ago we reported that -...