Reverse Shell Cheat Sheet
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterward you’ll probably want an interactive shell.
If it’s not possible...
Hackers Leak Personal Data from Hundreds of German Politicians On Twitter
Germany has been hit with the biggest hack in its history.
A group of unknown hackers has leaked highly...
Setup Proxychains in Linux
What is Proxychains?
Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...
This Skype vulnerability allows you to bypass Android’s phone lock
A security researcher found a vulnerability in Skype’s Android app which allows users to access several app functions without entering the passcode...
Emotet Banking Trojan is back again
Emotet, the infamous banking trojan has emerged again in the radar after a dip in its activity.
The latest version of Emotet can...
Millions of dollars stolen in scam by taxi drivers in Toronto, Police arrests six
Since 2018, the Greater Toronto Area is facing a major taxi fare scam that involves drivers defrauding customers.
The criminal drivers rely on...