Tutorial and Tools

Metasploit with Docker and Kubernetes

The purpose of this article is to make it easy to build a penetration test environment without any other complicated settings as long as...

Credentials for 50 thousand Fortinet VPN devices published online

Last weekend, one of the hacker forums posted exploits for a vulnerability in Fortinet VPN devices ( CVE-2018-13379 ) and the IP addresses of...

How To Use Powershell Empire

Initial setup Build a C2 server called listener ================================================================ Post-Exploitation Framework ================================================================ 2.5 | https://github.com/empireProject/Empire ================================================================ _______ .___ ___. .______ ...

Scan Open Ports With Nmap – Full Tutorial

1 What is nmap? Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to...

Mitaka – Powerful OSINT Tool on Chrome

When trying to search the IOC (Indicator of Compromise) for IP addresses, domains, hash values, etc. with OSINT services (Shodan, Censys, VirusTotal, etc.), do...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to share samples among malware researchers.Acts as...

SocialFish – Let’s Go Phishing

SocialFish is an open-source phishing tool, integrated with another open source tool – Ngrok, which allows you to easily create a phishing page of most...

Astsu – A network scanner tool

A network scanner tool, developed in Python 3 using scapy. How it works Scan common ports: Send a TCP Syn packet to the destination on the...

Latest news

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Fresh bug in VMware vCenter is already under attack

An exploit for the recently fixed RCE vulnerability in VMware vCenter (CVE-2021-22005) has been published online. Experts warned that hackers...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

Cobalt Strike sources uploaded to GitHub

An open repository was found on GitHub, the contents...

Lookout! QakBot is back

Seems like the end of this 2020 summer has...