frida-wshook is an analysis and instrumentation tool which uses frida.re to hook common functions often used by malicious script files which are...
Just like the healthcare industry, the financial market players are also a profitable target of cybercriminal elements. The Global DNS Threat Report...
Ryan Lin was just recently sentenced to 17 years in prison. He was sentenced for committing a range of crimes including cyberstalking,...
Chinese researchers have discovered cyber widely spread the GhostDNS malicious campaign that has captured more than 100,000 home routers and changed their...
The DNS or Domain Name System is one of the most necessary components for the internet functionality. Most often, the internet businesses...
Security researchers at NetLab, a sub-division of the Chinese cybersecurity firm Qihoo 360, have discovered a new, wide-scale, and very active malware...
DNS Queries Intercepted Due to Bogus DNS Traffic Protection Standards. Would you believe that a majority of the DNS queries that are...
Armis, an Internet of Things (IoT) security vendor and cyber-security firm, reports that about half a billion smart devices being used around...
Devploit is a simple python script to Information Gathering. Download: git clone https://github.com/joker25000/Devploit How to use: cd Devploit chmod +x install ./install...
DNS Rebind Toolkit is a frontend JavaScript framework for developing DNS Rebinding exploits against vulnerable hosts and services on a...
Roaming Mantis malware also targets iOS devices for phishing attacks. ‘Roaming Mantis uses DNS hijacking to infect Android smartphones’ was the title...
Last month, HackRead reported how tons of popular VPN (Virtual Private Network) software were leaking real IP addresses of users through WebRTC leak along...
GetAltName it’s a little script that can extract Subject Alt Names for SSL Certificates directly from HTTPS web sites which can provide...
Scanless is a command-line utility for using websites that can perform port scans on your behalf. Useful for early stages of a...
The APT15 hacking group has always been associated with Chinese intelligence and it has been part of quite a few, infamous hacking...
The general perception about Apple devices is that they are protected from malware and other hacking attacks. But since hackers are getting...
As the price of Bitcoin and other cryptocurrencies is surging, the cybercriminal community is exploring the opportunity to steal user funds as...
Tavis Ormandy, an IT security researcher at Google’s Project Zero has identified a critical flaw in Transmission BitTorrent app that if exploited lets...
mitm6 is a pentesting tool that exploits the default configuration of Windows to take over the default DNS server. It does this...
dnscap is a network capture utility designed specifically for DNS traffic. It produces binary data in pcap(3) and other format. This utility is similar to tcpdump(1),...
DNSExfiltrator allows for transfering (exfiltrate) a file over a DNS request covert channel. This is basically a data leak testing tool allowing...