Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community and red teamers with updated…
Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or…
Threat actors advertised a new version of the information stealer malware kit HawkEye Reborn v9 that exfiltrates various information from…
Sophisticated threats are Evolving with much more advanced capabilities and giving more pain for analysis even evade the advanced security…
TheFatRat is a simple Android RAT tool to build a backdoor and post-exploitation attacks like browser attacks. This Android RAT…
Cisco Global Exploiter (CGE) Cisco Global Exploiter (CGE), is an advanced, simple and fast security testing tool / exploit engine,…
Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on…
A Well known APT group called Energetic Bear/Crouching Yeti attacked various companies servers with a strong focus on energy and industrial sectors…
According to Kali Tool list, Linux Exploit Suggester provide just a simple script to keep track of vulnerabilities and suggest…
NetCut is a software which enables a network admin to turn off the internet connection of any machine in a…