Finnish Customs Sold Almost 1,900 BTC for $47.5 MillionFinnish Customs announced the sale of 1,889 Bitcoins seized during investigations into drug crimes. According to a press...
Author: admin
pycrate v0.5.5 releases: Python library to ease the development of encoders and decoders
pycrate v0.5.5 releases: Python library to ease the development of encoders and decodersPycrate is a French word for qualifying bad wine. The present software library has...
doenerium: Fully undetected grabber
doenerium: Fully undetected grabberdoenerium Fully undetected grabber (grabs wallets, passwords, cookies, modifies discord client, etc.) Features Stealer Discord Token Discord Info – Username,... The post doenerium:...
Amazon might own your doctor’s office after this latest acquisition
Amazon might own your doctor’s office after this latest acquisitionEXECUTIVE SUMMARY: Amazon is set to buy One Medical, a group that operates over 180 medical offices...
LiveTargetsFinder – Generates Lists Of Live Hosts And URLs For Targeting, Automating The Usage Of MassDNS, Masscan And Nmap To Filter Out Unreachable Hosts And Gather Service Information
LiveTargetsFinder – Generates Lists Of Live Hosts And URLs For Targeting, Automating The Usage Of MassDNS, Masscan And Nmap To Filter Out Unreachable Hosts And Gather...
Candiru spyware exploited Chrome 0-day flaw to attack journalists
Candiru spyware exploited Chrome 0-day flaw to attack journalistsOn July 4, 2022, the Google Chrome stable channel was updated to version 103.0.5060.114. The vulnerabilities fixed by...
VLANPWN: VLAN attacks toolkit
VLANPWN: VLAN attacks toolkitVLANPWN VLAN attacks toolkit DoubleTagging.py – This tool is designed to carry out a VLAN Hopping attack. VLAN hopping is... The post VLANPWN:...
modDetective – Tool That Chronologizes Files Based On Modification Time In Order To Investigate Recent System Activity
modDetective – Tool That Chronologizes Files Based On Modification Time In Order To Investigate Recent System ActivitymodDetective is a small Python tool that chronologizes files based...
How new encryption standards can protect your data from the next breach
How new encryption standards can protect your data from the next breachTilo Weigandt is an entrepreneur who makes it his mission to combat hacks and leaks....
Phishing Bonanza: Social-Engineering Savvy Skyrockets as Malicious Actors Cash In
Phishing Bonanza: Social-Engineering Savvy Skyrockets as Malicious Actors Cash InContenido de la entradaLeer másProofpoint News Feed
Security considerations for telehealth businesses
Security considerations for telehealth businessesDevin Partida writes about cyber security and technology. She is also the Editor-in-Chief of ReHack.com. During the pandemic, telehealth garnered extensive attention due...
CVE-2022-31107: Grafana OAuth Account Takeover Vulnerability
CVE-2022-31107: Grafana OAuth Account Takeover VulnerabilityOpen-source analytics and interactive visualization solution Grafana received a critical update recently to fix two high-severity security vulnerabilities that enabled... The...
CVE-2022-31107: Grafana OAuth Account Takeover Vulnerability
CVE-2022-31107: Grafana OAuth Account Takeover VulnerabilityOpen-source analytics and interactive visualization solution Grafana received a critical update recently to fix two high-severity security vulnerabilities that enabled... The...
Kubeaudit – Tool To Audit Your Kubernetes Clusters Against Common Security Controls
Kubeaudit – Tool To Audit Your Kubernetes Clusters Against Common Security Controlskubeaudit is a command line tool and a Go package to audit Kubernetes clusters for...
Kubeaudit – Tool To Audit Your Kubernetes Clusters Against Common Security Controls
Kubeaudit – Tool To Audit Your Kubernetes Clusters Against Common Security Controlskubeaudit is a command line tool and a Go package to audit Kubernetes clusters for...
mobsfscan v0.1.1 releases: find insecure code patterns in your Android and iOS source code
mobsfscan v0.1.1 releases: find insecure code patterns in your Android and iOS source codemobsfscan mobsfscan is a static analysis tool that can find insecure code patterns in...
mobsfscan v0.1.1 releases: find insecure code patterns in your Android and iOS source code
mobsfscan v0.1.1 releases: find insecure code patterns in your Android and iOS source codemobsfscan mobsfscan is a static analysis tool that can find insecure code patterns in...
Zenbuster – Multi-threaded URL Enumeration/Brute-Forcing Tool
Zenbuster – Multi-threaded URL Enumeration/Brute-Forcing ToolZenBuster is a multi-threaded, multi-platform URL enumeration tool written in Python by Zach Griffin (@0xTas). I wrote this tool as... The...
Zenbuster – Multi-threaded URL Enumeration/Brute-Forcing Tool
Zenbuster – Multi-threaded URL Enumeration/Brute-Forcing ToolZenBuster is a multi-threaded, multi-platform URL enumeration tool written in Python by Zach Griffin (@0xTas). I wrote this tool as... The...
Koh – The Token Stealer
Koh – The Token Stealer[*] Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material... The post...
Koh – The Token Stealer
Koh – The Token Stealer[*] Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material... The post...
XLL Phishing: specifically crafted for Microsoft Excel
XLL Phishing: specifically crafted for Microsoft ExcelXLL_Phishing Introduction With Microsoft’s recent announcement regarding the blocking of macros in documents originating from the internet (email AND web download),......
XLL Phishing: specifically crafted for Microsoft Excel
XLL Phishing: specifically crafted for Microsoft ExcelXLL_Phishing Introduction With Microsoft’s recent announcement regarding the blocking of macros in documents originating from the internet (email AND web download),......
CVE-2022-33891: Apache Spark Shell Command Injection Vulnerability
CVE-2022-33891: Apache Spark Shell Command Injection VulnerabilityApache Spark released the latest security bulletin on July 18, which contains a shell command injection vulnerability (CVE-2022-33891). The severity......
CVE-2022-33891: Apache Spark Shell Command Injection Vulnerability
CVE-2022-33891: Apache Spark Shell Command Injection VulnerabilityApache Spark released the latest security bulletin on July 18, which contains a shell command injection vulnerability (CVE-2022-33891). The severity......
GraphCrawler: GraphQL automated testing tookit
GraphCrawler: GraphQL automated testing tookitGraphCrawler Graph Crawler is an automated testing toolkit for any GraphQL endpoint. It will run through and check if the... The post...
GraphCrawler: GraphQL automated testing tookit
GraphCrawler: GraphQL automated testing tookitGraphCrawler Graph Crawler is an automated testing toolkit for any GraphQL endpoint. It will run through and check if the... The post...
Coercer v1.6 releases: automatically coerce a Windows server to authenticate on an arbitrary machine
Coercer v1.6 releases: automatically coerce a Windows server to authenticate on an arbitrary machineCoercer A python script to automatically coerce a Windows server to authenticate on...
Coercer v1.6 releases: automatically coerce a Windows server to authenticate on an arbitrary machine
Coercer v1.6 releases: automatically coerce a Windows server to authenticate on an arbitrary machineCoercer A python script to automatically coerce a Windows server to authenticate on...
Cdb – Automate Common Chrome Debug Protocol Tasks To Help Debug Web Applications From The Command-Line And Actively Monitor And Intercept HTTP Requests And Responses
Cdb – Automate Common Chrome Debug Protocol Tasks To Help Debug Web Applications From The Command-Line And Actively Monitor And Intercept HTTP Requests And ResponsesPown CDB...