Tutorial and Tools

Metasploit with Docker and Kubernetes

The purpose of this article is to make it easy to build a penetration test environment without any other complicated settings as long as...

Credentials for 50 thousand Fortinet VPN devices published online

Last weekend, one of the hacker forums posted exploits for a vulnerability in Fortinet VPN devices ( CVE-2018-13379 ) and the IP addresses of...

How To Use Powershell Empire

Initial setup Build a C2 server called listener ================================================================ Post-Exploitation Framework ================================================================ 2.5 | https://github.com/empireProject/Empire ================================================================ _______ .___ ___. .______ ...

Scan Open Ports With Nmap – Full Tutorial

1 What is nmap? Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to...

Mitaka – Powerful OSINT Tool on Chrome

When trying to search the IOC (Indicator of Compromise) for IP addresses, domains, hash values, etc. with OSINT services (Shodan, Censys, VirusTotal, etc.), do...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to share samples among malware researchers.Acts as...

SocialFish – Let’s Go Phishing

SocialFish is an open-source phishing tool, integrated with another open source tool – Ngrok, which allows you to easily create a phishing page of most...

Astsu – A network scanner tool

A network scanner tool, developed in Python 3 using scapy. How it works Scan common ports: Send a TCP Syn packet to the destination on the...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

Pareto botnet claims jailbroken devices are TVs

Experts from Human Security (formerly White Ops) have discovered the Pareto botnet that infects Android devices and uses them to scam...

Vulnerable Microsoft Exchange Servers Attacked by Prometei Botnet

Since the patches for ProxyLogon problems were still not fully installed, attackers continue to attack vulnerable Microsoft Exchange servers. Now researchers from Cybereason Nocturnus have discovered the Prometei botnet, which mines Monero cryptocurrency on vulnerable machines.

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

IoT Security – Why is it Important?

IoT or Internet of Things are connected devices, including...

Whirlpool became a victim of Nefilim operators, part of the data was leaked to the Network

The American corporation Whirlpool, one of the largest manufacturers...

Credentials for 50 thousand Fortinet VPN devices published online

Last weekend, one of the hacker forums posted exploits...