Australian law enforcement arrested two suspected drug traffickers and seized more than $1.5 million in cryptocurrency after the Australian Border Force intercepted...
Loki: like Prometheus, but for logs. Loki is a horizontally-scalable, highly-available, multi-tenant log aggregation system inspired by Prometheus. It is designed to be...
DNSTARS, the self-described “independent drug testing and publishing platform” is shutting down. The forum is most well known for hosting the results...
Recently, security researchers at a professional application security protection company, Promon said that they found a vulnerability in the Android operating system...
A simple CORS misconfiguration scannerBased on the research of James KettleCORStest is a quick & dirty Python 2 tool to find Cross-Origin...
Nine members of a 13-member darkweb drug trafficking ring were imprisoned for their roles in the operation. The ring sold a variety...
Lithnet Password Protection for Active Directory (LPP) enhances the options available to an organization wanting to ensure that all their Active Directory...
Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null terminated) registry key. This...
The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names and reverse...
CodeCat is a open source tool to help you in codereview, to find/track sinks and this points follow regex rules…How too install,...
Police in Austria shut down a large-scale drug trafficking operation that conducted operations electronically. According to the police, the group purchased drugs...
Cybersecurity: The Beginner’s Guide It’s not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking...
A small linux information collection script is mainly used for emergency response. It can be used under Debian or Centos.Features CPU TOP10,...
A security issue discovered by security research company SafeBreach in Kaspersky Secure Connection, which itself is bundled into a range of other...
Burp Suite extension to discover a apikey/tokens from HTTP response. Install download SecretFinder wget https://raw.githubusercontent.com/m4ll0k/BurpSuite-Secret_Finder/master/SecretFinder.pyorgit clone https://github.com/m4ll0k/BurpSuite-Secret_Finder.git now open Burp > Extender...
aSYNcrone is a SYN Flood DDoS Attack Tool!Usage: git clone https://github.com/fatih4842/aSYNcrone.gitcd aSYNcronegcc aSYNcrone.c -o aSYNcrone./aSYNcrone <source IP> <source port> <destination IP> <destination...
Recently unsealed court documents uncovered an FBI search warrant application requesting information on a PlayStation user from Sony. The allegedly user believed...
Nessus XML Praser Requirements Python3 Django Tested on Ubuntu 18.04 What it does Vulnerability based parsing Service based parsing Host bases parsing...
Google released a December 2019 Android security patch for its latest Android 10 mobile operating system series to address some of the...
Sooty is a tool developed with the task of aiding SOC analysts with automating part of their workflow. One of the goals...
With the rise of instant messaging applications such as WhatsApp, Signal, and Telegram. A large number of similar applications have begun to...