full screen background image

Hacker βοηθά οικογένεια να επανακτήσει το αυτοκίνητό της

Hacker βοήθησε οικογένεια από τον Καναδά να επανακτήσει το αυτοκίνητό της,...

OpDomesticTerrorism – Anonymous takes down Charlottesville website after the incident

Anonymous launched the OpDomesticTerrorism and claimed responsibility for carrying out a DDoS attack on the website of Charlottesville...

Microsoft Launches Ethereum-Based ‘Coco Framework’ to Speed Up Blockchain Network

A growing number of enterprises are showing their interest in blockchains, but the underlying software fails to meet key enterprise...

Password Flaws Patched in PostgreSQL

Security updates released last week by the developers of the open source object-relational database management system PostgreSQL address...

Peace Breaks Out Between Microsoft and Kaspersky Lab

Microsoft Agrees to Kaspersky Lab’s Demands Microsoft and Kaspersky are friends again, and the whole anti-virus ecosystem is at...

Symantec Patches Code Execution Flaw in Email Security Product

Symantec has released an update for its Messaging Gateway email security product to address remote code execution and cross-site request...

OWASP Python Security Project

Python Security is a free, open source, OWASP project that aims at creating a hardened version of python that makes it easier for...

algo: Set up a personal IPSEC VPN in the cloud

Algo VPN Algo VPN is a set of Ansible scripts that simplify the setup of a personal IPSEC VPN. It uses the most secure defaults available,...

Hack the Moria: 1.1 (CTF Challenge)

Today I found a Vulnerable Lab based on the world of Lords of The Rings. So get on your Gandalf mode to solve this fun Vulnerable...

Hack the DonkeyDocker (CTF Challenge)

Today we are going to solve a fun Vulnerable Lab DonkeyDocker, download this VM Machine from here. The credit for developing this VM...

Spaghetti – Web Application Security Scanner

Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and...

PyREBox – Python scriptable Reverse Engineering Sandbox

  PyREBox is a Python scriptable Reverse Engineering sandbox. It is based on QEMU, and its goal is to aid reverse engineering by...

LinEnum v0.6 – Scripted Local Linux Enumeration and Privilege Escalation Checks

LinEnum will automate many of the checks that I’ve documented in the Local Linux Enumeration & Privilege Escalation Cheatsheet....

PHP Lab: File Upload Vulnerabilities

Many websites require file upload functionality for their users. Social networking websites, such as Facebook and Twitter allow their users...

Researchers believe that Microsoft’s technology may speed up the usage of BlockChain

The organization said on Thursday that it had produced a system called Coco Framework, which connects to various blockchain systems to work...

Crosstalk Leakage Attacks – USB gadgets can spy on data flowing in and out adjacent ports

Crosstalk Leakage Attacks – Experts demonstrated that USB gadgets can secretly spy on data flowing in and out of devices plugged into...

DNA Contains Instructions for Biological and Computer Viruses

University of Washington scientists have created an experiment that shows how DNA can be used to not only create biologic viruses, but also...

APT28 hackers are leveraging NSA Hacking tool to spy on Hotels guests

According to FireEye, the notorious Russia-linked APT28 group is behind an ongoing campaign targeting hotels in several European countries....

HBO Offered Hackers $250,000 As Ransom to Prevent More Leaks

Hackers who recently hacked into HBO network and stole scripts, shows, and employee information documents, have now provided an email in...

Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests

An infamous Russian-linked cyber-espionage group has been found re-using the same leaked NSA hacking tool that was deployed in the WannaCry...

NIST: νέες πολιτικές για ασφαλείς κωδικούς πρόσβασης

Το Εθνικό Ινστιτούτο Προτύπων και Τεχνολογίας των Ηνωμένων Πολιτειών (NIST)...

To Antivirus Live CD 23.0-0.99.2 είναι διαθέσιμο για κατέβασμα

Ο προγραμματιστής της linux διανομής 4MLinux Zbigniew Konojacki, ανακοίνωσε σήμερα την...

Flash Player μετά την ενημέρωση: ευπάθεια και πάλι

Νωρίτερα αυτή την εβδομάδα, η Adobe ενημέρωσε το Flash Player, καθώς ένα σφάλμα...

Analysing TCP Headers using Wireshark

From Wikipedia TCP is used mostly by various applications available by internet, including the World Wide Web (WWW), E-mail, File...

Penetration Testing from the Cloud

In this article we will be looking at an alternative for installing Kali Linux on a dedicated machine or a local Virtual Machine: Kali...

Malware campaign targets Russian-Speaking companies with a new Backdoor

Trend Micro spotted a new espionage campaign that has been active for at least 2 months and that is targeting Russian-speaking firms with...

More than 1,000 Spyware Apps Found On Android App Stores

If you think you are downloading apps from Google Play Store and you are secure, then watch out! Someone has managed to flood third-party...

Awesome Malware Analysis Tools

A curated list of awesome malware analysis tools and resources. Inspired by awesome-python and awesome-php. Awesome Malware Analysis...

How to make a Virtual lab

Hi everyone ! Hope you’re all doing well. So today I will show you how you can build your own virtual lab ( For malware analysis or...

PE File Infection

The following paper documents a possible PE file infection technique which covers a high level overview and the low level code of how both...