Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software…
Cyber News
-
-
SecuritySecurity Tools
MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory
MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory This package attempts…
-
Simple command line forensics tool for tracking USB device artifacts (history of USB events)…
-
SleuthQ- A Tool To Find SQL Injection Vulnerability Python3 Burp History parsing tool to…
-
Apr 25, 2024NewsroomVulnerability / Zero-Day A new malware campaign leveraged two zero-day flaws in…
-
This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is…
-
CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible Cloudcheck is made…
-
“Napper”- A Trusted Platform Module (TPM) Vulnerability Checker Tool TPM vulnerability checking tool for…
-
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams. With limited…
-
Apr 25, 2024NewsroomMalware / Cyber Threat The North Korea-linked threat actor known as Lazarus…
