Sunday, May 19, 2024

Yearly Archives: 2021

ZINC campaign targets Security Researchers

Recently, Microsoft has detected an ongoing ZINC campaign targeting security researchers working on vulnerability research and development. The same campaign was reported by Google’s...

oclGaussCrack

The goal of the program is to crack the verification hash of the encrypted payload of the Gauss Virus. Uses OpenCL to accelerate the...

Ncrack

Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and...

Maskprocessor

 Maskprocessor is a High-Performance word generator with a per-position configureable charset packed into a single stand-alone binary. Maskprocessor is a High-Performance word generator with...

Keimpx

keimpx is an open source tool, released under a modified version of Apache Licence 1.1. It can be used to quickly check for valid credentials...

Outsourcing Company Serco Suffers Ransomware Attack

The multi-national outsourcing company Serco which is responsible for running a part of the UK’s COVID-19 Test and Trace system has been hit by...

Many SolarWinds Victims were Not Directly linked to SolarWinds

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) stated that many of the victims of the threat group that targeted Texas-based IT management firm...

Researchers Discover New Trickbot Campaign

Recently, a new Trickbot campaign has been detected by security researchers just a few months after Trickbot operations were shut down by a coalition...

HexorBase

HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is capable of performing SQL...

Hash-identifier

Software to identify the different types of hashes used to encrypt data and especially passwords. Encryption formats supported: ADLER-32 CRC-32 CRC-32B CRC-16 CRC-16-CCITT DES(Unix) FCS-16 ...

Most Read

Write For Us