Slack

2025-02-04

Slack is company that develops “Slack”, a cloud-based messaging application that enables team collaboration.

https://www.slack.com

Read More

CCDC

2025-02-03

The Collegiate Cyber Defense Competition (CCDC) is an organized cybersecurity CTF event in which college students test their ability to manage and ...

Read More

credential

2025-02-03

Credentials are pieces of authentication data used to verify the identify of a user, system, device, etc on a computer system.

Read More

unpacking diicot-tikochinski2024

2025-02-03

Unpacking Diicot - Evolving Campaign Targeting Linux Environments

by Gili Tikochinski and Yaara Shriki

Wiz Threat Research 2024 ...

Read More

china-linked hackers target Linux systems-antoniuk2024

2025-02-02

China-linked hackers target Linux systems with new spying malware

by Daryna Antoniuk

November 22, 2024 The Record ...

Read More

encrypted bind and reverse shells with socat - erev0s 2020

2025-02-02

Encrypted Bind and Reverse Shells with Socat (Linux/Windows) Encrypt your traffic with openssl when using bind or reverse shells.

by erev0s

June 20, ...

Read More

metasploit shellcode grows up: encrypted and authenticated C shells-pace2019

2025-02-02

Metasploit Shellcode Grows Up: Encrypted and Authenticated C Shells

by Shelby Pace

Rapid7, 2019 ...

Read More

Personal Knowledge Management

2025-02-02

Personal Knowledge Management (PKM) is the process of collecting, storing, retrieving, and organizing information in a manner conductive to ...

Read More

pingback payloads-watters2019

2025-02-02

Introducing Pingback Payloads

by Brendan Watters

Rapid7 August 1, 2019

https://www.rapid7.com/blog/post/2019/08/01/introducing-pingback-payloads/

This ...

Read More

SSH password stealer

2025-02-02

There are many malware families that steal passwords from SSH servers and clients with the intent of being used maliciously by a threat actor.

Read More