full screen background image
Search
Thursday 18 January 2018
  • :
  • :

ACE – Automated, Collection, and Enrichment Platform

  The Automated Collection and Enrichment (ACE) platform is a suite of tools for threat hunters to collect data from many endpoints in...

Recon-ng – Full-Featured Web Reconnaissance Framework

  Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction,...

[Bug] macOS High Sierra App Store Preferences Can Be Unlocked Without a Password

Yet another password vulnerability has been uncovered in macOS High Sierra, which unlocks App Store System Preferences with any password...

Warning: New Undetectable DNS Hijacking Malware Targeting Apple macOS Users

A security researcher has revealed details of a new piece of undetectable malware targeting Apple’s Mac computers—reportedly first...

CSE Malware ZLab – Double Process Hollowing -The stealth process injection of the new Ursnif malware

A new variant of the infamous Ursnif malware spread in the wild and adopts a new advanced evasion technique dubbed Double Process...

truffleHog – Searches Through Git Repositories For High Entropy Strings And Secrets, Digging Deep Into Commit History

Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets...

Attackers Exploit Oracle WebLogic Flaw to Mine $266K in Monero

Another day, another Monero cryptomining campaign and this time attackers exploited a security flaw in Oracle Fusion Middleware. Latest...

Intel: Νέα ευπάθεια. Προστατεύστε τους φορητούς υπολογιστές σας

Σαν να μην έφταναν στην Intel τα σφάλματα Meltdown και Specter, ο ερευνητής ασφάλειας...

Wireshark 2.4.4: ο καλύτερος αναλυτής πρωτοκόλλων δικτύου

Νέο Wireshark 2.4.4! Το Wireshark είναι ένα freeware εργαλείο για την παρακολούθηση δικτύων....

Microsploit (Office Exploitation Tool)

a Simple tool and not very special but this tool fast and easy create backdoor office exploitation using module metasploit packet. Like...

Salamandra – Spy Microphone Detection Tool

Salamandra is a tool to detect and locate spy microphones in closed environments. It find microphones based on the strength of the signal...

Archery – Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities

  Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and...

Critical Intel AMT Flaw Lets Attackers Hack Laptops in Mere Seconds

It has been a matter of days when we found out about the flaws in AMD, ARM and Intel’s computer microchips that allowed attackers to...

iPhone, Android, Windows Browsers: Ποιοι επηρεάστηκαν από το Spectre Bug

Ένας από τους τρόπους με τους οποίους το Spectre hardware bug μπορεί να κλέψει...

Anubis – Subdomain Enumeration And Information Gathering Tool

  Anubis is a subdomain enumeration and information gathering tool. Anubis collates data from a variety of sources, including...

CoffeeMiner – Collaborative (MITM) Cryptocurrency Mining Pool In Wifi Networks

Collaborative (mitm) cryptocurrency mining pool in wifi networks Warning: this project is for academic/research purposes only. A blog post...

Android Malware written in Kotlin found on Play Store stealing data

Just another day with just another Android malware hosted on Google Play Store targeting unsuspecting users – But this time, the malware...

Wapiti 3.0.0 – The Web-Application Vulnerability Scanner

  Wapiti allows you to audit the security of your websites or web applications. It performs “black-box” scans (it does not...

Η AMD κυκλοφορεί ενημερώσεις firmware Spectre για να διορθώσει τις ευπάθειες CPU

Η αρχική απόκριση της AMD στα ελαττώματα επεξεργαστή Meltdown και Spectre, κατέστησε...

shodan-cli: Simple golang Shodan command line

shodan-cli Simple golang Shodan command line client with default query. Build $ go get gopkg.in/ns3777k/go-shodan.v2/shodan $ go get...

How to Configure Suricata IDS in Ubuntu

Suricata is developed by the Open Information Security Foundation. Suricata is a high performance Network IDS, IPS and Network Security...

Fourth Fappening Hacker Admits to Stealing Celebrity Pics From iCloud Accounts

Almost three years after the massive leakage of high-profile celebrities’ nude photos—well known as “The Fappening” or...

Detect SQL Injection Attack using Snort IDS

Hello friends!! Today we are going to discuss how to “Detect SQL injection attack” using Snort but before moving ahead kindly read our...

Malware infected fake Telegram Messenger app found in Play Store

The Google Play Store is home to more than 3.5 million apps but at the same time, there are tons of apps that are malicious and infected...

Check Meltdown Vulnerability in CPU

Hello Friends!! You must be heard of the latest vulnerbility “Meltdown” which has been discovered almost in every CPU having intel...

Η Microsoft προσθέτει end to end κρυπτογράφηση στο Skype

Καλά νέα για τους φίλους της Microsoft, αφού με μια συνεργασία της εταιρείας με...

Win32/Laziok malware – Cybersecurity research

This topic it is about Win32 / Laziok malware. It does not matter where I found it. His hidden activity is very intense. Seeks to install...

Spear phishing attacks already targeting Pyeongchang Olympic Games

Hackers are already targeting the Pyeongchang Olympic Games with spear phishing attacks aimed at stealing sensitive or financial...

Fake Android apps caught dropping Coinhive miner

In October last year, three Android apps on Play Store were found infected with Coinhive cryptocurrency miner to generate Monero digital...

Η Google αφαιρεί 36 κακόβουλες εφαρμογές ασφαλείας

Η Google καταργεί 36 κακόβουλες εφαρμογές Android που βρίσκονταν στο Play Store και...