Tutorial and Tools

Metasploit with Docker and Kubernetes

The purpose of this article is to make it easy to build a penetration test environment without any other complicated settings as long as...

Credentials for 50 thousand Fortinet VPN devices published online

Last weekend, one of the hacker forums posted exploits for a vulnerability in Fortinet VPN devices ( CVE-2018-13379 ) and the IP addresses of...

How To Use Powershell Empire

Initial setup Build a C2 server called listener ================================================================ Post-Exploitation Framework ================================================================ 2.5 | https://github.com/empireProject/Empire ================================================================ _______ .___ ___. .______ ...

Scan Open Ports With Nmap – Full Tutorial

1 What is nmap? Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to...

Mitaka – Powerful OSINT Tool on Chrome

When trying to search the IOC (Indicator of Compromise) for IP addresses, domains, hash values, etc. with OSINT services (Shodan, Censys, VirusTotal, etc.), do...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to share samples among malware researchers.Acts as...

SocialFish – Let’s Go Phishing

SocialFish is an open-source phishing tool, integrated with another open source tool – Ngrok, which allows you to easily create a phishing page of most...

Astsu – A network scanner tool

A network scanner tool, developed in Python 3 using scapy. How it works Scan common ports: Send a TCP Syn packet to the destination on the...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

LastPass for Android found seven built-in trackers

German cybersecurity expert Mike Kuketz noticed that there are seven trackers in the LastPass app for Android that monitor users. The researcher...

More than 400 phishing campaigns per week were associated with Valentine’s Day

Check Point experts report that hackers "celebrated" Valentine's Day in a big way. The company's analysts recorded more than 400 phishing campaigns...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Microsoft and McAfee join coalition against ransomware

Microsoft, McAfee and Citrix are the main participants in...

Telegram has implemented a panic button to block data leaks

Corpsoft24, a company specializing in the provision of cloud...

Popular The Great Suspender Chrome Extension Contains Malware

The Great Suspender extension has been removed from the...