According to information security specialists, ZoneAlarm, the firewall software produced by security firm Check Point, was the victim of a data breach...
This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard...
A recent research published by vulnerability testing specialists from Purdue University details a new exploit that abuses some Android operating system smartphones...
This project produces open-source code to generate rainbow tables as well as use them to look up password hashes. While the current...
The Brave Privacy Browser is your fast, safe private web browser with ad blocker, private tabs and pop-up blocker. Browse without being...
Burp Suite extension to discover assets from HTTP response using passive scanning. Refer our blog Asset Discovery using Burp Suite for more...
According to data protection specialists, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) launched a new set of...
Information security experts anticipate that the balance in cybersecurity by the end of 2019 will be disastrous. According to figures collected up...
A couple of days ago web application security specialists reported a ransomware attack on Petroleos Mexicanos (PEMEX), a state-controlled Mexican oil company....
Digital forensics specialists report the emergence of Buran, a new scheme for any user to acquire everything necessary to deploy a ransomware...
Easier network scanning with NetAss2 (Network Assessment Assistance Framework). Make it easy for Pentester to do penetration testing on network. Dependencies nmap...
Subdomain Scan With Ping Method. Flags Value Description –hostname example.com Domain for scan. –output Records the output with the domain name. –list...
Information security related incidents have become so common that any organization, whether it is a major multinational company or a small business,...
A team of digital forensics specialists has reported the finding of two major zero-day vulnerabilities in some ATM machines widely used in...
IMPORTANTWhen using source or by downloading the code directly from the repository, it is important to run the database upgrade script if...
According to reports from digital forensics experts, the dangerous hacker group known as Platinum has announced the release of Titanium, a new...
According to vulnerability testing specialists, a compression library included by default in multiple Linux distributions (Ubuntu, Debian, Gentoo, Arch Linux and FreeBSD...
Increasingly, cybersecurity incidents are affecting thousands, or even millions, of members of the gamer community. According to experts in ethical hacking, this...
The week is just beginning and new security incidents affecting major technology companies have already being reported. According to web application security...
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated....
threat_note is a web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related...