Slack
2025-02-04
Slack is company that develops “Slack”, a cloud-based messaging application that enables team collaboration.
Read More
CCDC
2025-02-03
The Collegiate Cyber Defense Competition (CCDC) is an organized cybersecurity CTF event in which college students test their ability to manage and ...
Read More
credential
2025-02-03
Credentials are pieces of authentication data used to verify the identify of a user, system, device, etc on a computer system.
Read More
unpacking diicot-tikochinski2024
2025-02-03
Unpacking Diicot - Evolving Campaign Targeting Linux Environments
by Gili Tikochinski and Yaara Shriki
Wiz Threat Research 2024 ...
Read More
china-linked hackers target Linux systems-antoniuk2024
2025-02-02
China-linked hackers target Linux systems with new spying malware
by Daryna Antoniuk
November 22, 2024 The Record ...
Read More
encrypted bind and reverse shells with socat - erev0s 2020
2025-02-02
Encrypted Bind and Reverse Shells with Socat (Linux/Windows) Encrypt your traffic with openssl when using bind or reverse shells.
by erev0s
June 20, ...
Read More
metasploit shellcode grows up: encrypted and authenticated C shells-pace2019
2025-02-02
Metasploit Shellcode Grows Up: Encrypted and Authenticated C Shells
by Shelby Pace
Rapid7, 2019 ...
Read More
Personal Knowledge Management
2025-02-02
Personal Knowledge Management (PKM) is the process of collecting, storing, retrieving, and organizing information in a manner conductive to ...
Read More
pingback payloads-watters2019
2025-02-02
Introducing Pingback Payloads
by Brendan Watters
Rapid7 August 1, 2019
https://www.rapid7.com/blog/post/2019/08/01/introducing-pingback-payloads/
This ...
Read More
SSH password stealer
2025-02-02
There are many malware families that steal passwords from SSH servers and clients with the intent of being used maliciously by a threat actor.
Read More