HIBP update: 361 million stolen emails & passwords of Telegram
Have I Been Pwned Database Updated with 361 Million Accounts Leaked on Telegram The Have I Been Pwned (HIBP) data…
Steganography Used to Hide Malware in PyPI Package
Researchers at Phylum discovered a malicious package on the Python Package Index (PyPI) named requests-darwin-lite. This package appeared to be…
h8mail | OSINT for Searching Exposed Credentials
h8mail is an email OSINT and password breach-hunting tool. It can be used to find email addresses and passwords leaked…
A dangerous vulnerability was found in Telegram for Windows.
User X (Twitter handle: @LizaFlux) shared a new vulnerability found in Telegram for Windows. During file auto-loading, arbitrary code execution…
pwnat | Bypass NAT/Firewall Tool
Pwnat is a game-changer for anyone who has ever struggled to connect devices behind separate NAT firewalls. Developed by Samy…
Networking Fundamentals Simply And Professionally
In today’s interconnected world, understanding networking fundamentals is crucial, whether you’re a cybersecurity professional, an IT enthusiast, or a curious…
Scanners Box | Powerful Hacker Toolkit
Scanners Box, also known as Scanbox, is a comprehensive open-source security testing toolkit. It brings together over 10 categories of…
Creating A Virtual Network How Docker Does It
As you know, Docker can create virtual networks for secure and convenient network interaction within containers. In this article, we…
OSINT: Tools for Searching in Tor’s Network
TOR can be just as good a source of information as Google. The main thing is to know how to…
5 Domain Attacks And How To Prevent It
1. Domain Phishing Imagine a masterfully crafted fake website – identical to your bank’s – luring you to share your…