Tutorial and Tools
Articles
Metasploit with Docker and Kubernetes
The purpose of this article is to make it easy to build a penetration test environment without any other complicated settings as long as...
Articles
Credentials for 50 thousand Fortinet VPN devices published online
Last weekend, one of the hacker forums posted exploits for a vulnerability in Fortinet VPN devices ( CVE-2018-13379 ) and the IP addresses of...
Articles
How To Use Powershell Empire
Initial setup
Build a C2 server called listener
================================================================
Post-Exploitation Framework
================================================================
2.5 | https://github.com/empireProject/Empire
================================================================
_______ .___ ___. .______ ...
Articles
Scan Open Ports With Nmap – Full Tutorial
1 What is nmap?
Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to...
Articles
Mitaka – Powerful OSINT Tool on Chrome
When trying to search the IOC (Indicator of Compromise) for IP addresses, domains, hash values, etc. with OSINT services (Shodan, Censys, VirusTotal, etc.), do...
Tutorial and Tools
Saferwall : Open Source Malware Analysis
Saferwall is an open source malware analysis platform. It aims for the following goals:
Provide a collaborative platform to share samples among malware researchers.Acts as...
Tutorial and Tools
SocialFish – Let’s Go Phishing
SocialFish is an open-source phishing tool, integrated with another open source tool – Ngrok, which allows you to easily create a phishing page of most...
Tutorial and Tools
Astsu – A network scanner tool
A network scanner tool, developed in Python 3 using scapy.
How it works
Scan common ports: Send a TCP Syn packet to the destination on the...
Latest news
50% reduction in Google account hacks after enabling 2SV
One of the main problems is the lack of understanding by users of the benefits of additional authorization procedures.
It...
Dangerous vulnerability has been discovered in the latest version of the OpenSSL library
The vulnerability was discovered in the latest version of OpenSSL 3.0.4 , which was released on June 21, 2022 and affects...
Chrome 103 fixes 14 vulnerabilities
This week, Google developers released a stable version of Chrome 103 , which fixed 14 vulnerabilities. Independent researchers who uncovered some of...
Must read
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party...
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11,...
You might also likeRELATEDRecommended to you
Popular The Great Suspender Chrome Extension Contains Malware
The Great Suspender extension has been removed from the...
Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken
The largest hacking competition - the spring Pwn2Own 2021...
Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !
Network vulnerability assessment analyzes a variety of network issues,...