Recently, the Tencent Blade Team discovered a set of SQLite vulnerabilities called “Magellan 2.0”, allowing hackers to remotely run various malicious programs...
AVCLASS++: Yet Another Massive Malware Labeling Tool avclassplusplus is an appealing complement to AVCLASS [1], a state-of-the-art malware labeling tool. AVCLASS++ is a...
This has only been tested on Kali.It depends on the msfrpc module for Python, described in detail here: https://www.trustwave.com/Resources/SpiderLabs-Blog/Scripting-Metasploit-using-MSGRPC/Install the necessary Kali...
DumpTheGit DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories. The tool will flag the matches for...
Both Microsoft and Google have released software updates yesterday to fix some security vulnerabilities, including a zero-day vulnerability that has been exploited...
The internet has brought us all closer together than ever before. Never before in our history has mankind been able to communicate...
Security company Rapid7 has disclosed security vulnerabilities in three children’s smartwatches sold on Amazon. These three children’s smartwatches are the GreaSmart, the...
Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the company...
hashcobra Hash Cracking tool. Usage $ ./hashcobra -H--==[ hashcobra by sepehrdad ]==--usage: hashcobra -o <opr> [options] | [misc]options: -a <alg> - hashing...
Recently, researchers have discovered that undocumented features in Intel CPUs allow attackers to manipulate Intel CPU voltages in a controlled manner to...
A Polish man residing in Ireland was sentenced to three years in prison suspended after he pleaded guilty to possession of hundreds...
truegaze A static analysis tool for Android and iOS applications focusing on security issues outside the source code such as resource strings,...
Aleph is a tool for indexing large amounts of both documents (PDF, Word, HTML) and structured (CSV, XLS, SQL) data for easy browsing...
A Georgia man admitted his role as the ringleader of a large-scale drug trafficking operation responsible for producing and distributing up to...
The Attack Range solves two main challenges in development of detections. First, it allows the user to quickly build a small lab...
A fast web fuzzer written in Go.Heavily inspired by the great projects gobuster and wfuzz. Features Fast! Allows fuzzing of HTTP header...
On December 11, 2019, Microsoft and Adobe released the December security update. The types of vulnerabilities addressed include out-of-bounds reads and write,...
When comparing the difference of a shared server to a private server configuration one thing that people never consider is the fact...
A 35-year-old man from Northern Portugal was sentenced to 76 months in prison for dark web drug trafficking and money laundering. The...
Haaukins Haaukins is a highly accessible and automated virtualization platform for security education, it has three main components (Docker, Virtualbox, and Golang),...
This is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular fashion so...