Today, I am going to share a writeup for the boot2root challenge of the Vulnhub machine “Sumo: 1”. It was an intermediate box based on
Read more
All categories. All articles from all categories.
Today, I am going to share a writeup for the boot2root challenge of the Vulnhub machine “Sumo: 1”. It was an intermediate box based on
Read moreNishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is
Read moreNew web targets for the discerning hacker Once again, Covid-19 dominated the news this month, with controversy raging over contact-tracing apps and the myriad potential
Read moreAdam Bannister 29 May 2020 at 13:41 UTCUpdated: 29 May 2020 at 13:51 UTC Rewards of up to $10,000 on offer to ethical hackers who
Read moreAll-in-one tool for managing vulnerability reports WhyThe goal of Purify to be an easy-in-use and efficient tool to simplify a workflow of managing vulnerabilities delivered
Read moreWelcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few
Read moreThis is a point release. Download Whonix for VirtualBox: Whonix – 15 May 20 Whonix ™ for Windows, macOS, Linux inside VirtualBox Whonix ™ for
Read moreSuspect in SQLi credit card hacking spree indicted A New Yorker has been charged with conspiracy to hack into e-commerce websites in order to steal
Read moreCourt Denies Pre-Trial Release for XanaxKing 2020-05-29 A California court denied a motion for pre-trial release filed by Jeremy Donagal, the drug dealer convicted of
Read moreMemory Mapper is a lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of
Read moreJohn Leyden 28 May 2020 at 15:04 UTCUpdated: 28 May 2020 at 15:07 UTC Scam Spotter aims to help with ‘anti-social’ distancing Google has teamed
Read more