Category Archives: Vulnerabilities & attacks
Pocsuite – Vulnerability Testing Framework
Pocsuite is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec 404 Team
2FAssassin – Bypass Two-Factor-Authentication
2FAssassin is a tool that will help in exploiting certain misconfiguration or vulnerabilities on remote system to extract private keys from memory.
Striker – Offensive vulnerability scanner
Striker is an offensive information and vulnerability scanner that will make enumeration of remote system mostly using some online services this will make the attack not depending on user connection and it will make attacker avoid being detected or prevented
Rakos Malware that targets IoT devices and servers under SSH
Rakos Malware that targets IoT devices and servers under SSH. Security researchers at ESET uncovered a new malware that targets IoT-devices and servers running Linux.
Pocsuite – Remote Vulnerability Testing Framework
Scanning systems is very important when you are evaluating the security on your internal assets. One of the tools that can be used during a security assessment is Pocsuite.
Several Compromised WordPress Sites Serving Malwares
Several Compromised WordPress Sites Serving Malwares Malwarebytes security researchers have reported recently another malicious campaigned using WordPress..