Darknet - The Darkside: testssl.sh – Test SSL Security Including Ciphers,...
testssl.sh is a free command line tool to test SSL security, it checks a server’s service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more....
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
In this post I'll profile a currently circulating circa 2008 malicious and fraudulent scareware-serving campaign successfully enticing users into interacting with rogue and fraudulent fake security...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Remember ZeuS? The infamous crimeware-in-the-middle exploitation kit? In this post I'll provide historical OSINT on various ZeuS-themed malicious and fraudulent campaigns intercepted throughout 2008...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2008 and I'm stumbling upon yet another decent portfolio of compromised malware-serving Chinese government Web sites. In this post I'll discuss in-depth the campaign and provide actionable...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently intercepted a wide-spread Bebo malicious malware-serving campaign successfully enticing users into interacting with the fraudulent and malicious content potentially...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently intercepted a currently circulating malicious and fraudulent malware-serving spam campaign successfully enticing hundreds of thousands of users globally into interacting...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently stumbled upon yet another massive blackhat SEO campaign courtesy of the Koobface gang successfully exposing hundreds of thousands of users to a multi-tude of malicious...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and we've recently stumbled upon yet another malicious and fraudulent campaign courtesy of the Koobface gang actively serving fake security software also known as scareware to a variety of...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2008 and I've recently spotted a currently circulating malicious and fraudulent scareware-serving malicious domain portfolio which I'll expose in this post with the idea to share actionable threat...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
Dear blog readers, I'm currently seeking an investment regarding a cybercrime research project with the project proposal available on request. Approach me at disruptive.individuals@gmail.com
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It''s 2008 and I've recently stumbled upon a currently active typosquatted portfolio of malware-serving domains successfully impersonating Google further spreading malicious software to hundreds of...
View ArticleDidier Stevens: Release: Python Tool Templates
I’m releasing the templates for Python tools I shared and used during my BruCON and Hack.lu 2018 workshops.There’s a template for text files and one for binary files.python-templates_V0_0_1.zip (https)...
View ArticleNiels Provos: Pattern Welding Explained as Wearable Art
Pattern-Welding was used throughout the Viking-age to imbue swords with intricate patterns that were associated with mystical qualities. This visualization shows the pattern progression in a twisted...
View ArticleAlienVault Blogs: Detecting Empire with USM Anywhere
Empire is an open source post-exploitation framework that acts as a capable backdoor on infected systems. It provides a management platform for infected machines. Empire can deploy PowerShell and...
View Article...And you will know me by the trail of bits: Slither – a Solidity static...
Slither is the first open-source static analysis framework for Solidity. Slither is fast and precise; it can find real vulnerabilities in a few seconds without user intervention. It is highly...
View ArticleUn informático en el lado del mal: Fear the FOCA!: Cómo crear plugins para...
Para hoy domingo os voy a dejar solo un par de vídeos que suman menos de veinticinco minutos entre los dos, para los amantes de la seguridad informática, el pentesting y el hacking, que desean siempre...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2008 and I recently came across to a pretty decent portfolio of rogue and fraudulent malicious scareware-serving domains successfully acquiring traffic through a variety of black hat SEO...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2008 and I've recently came across to a massive black hat SEO campaign successfully enticing users into falling victim into fraudulent and malicious scareware-serving campaign. In this post I'll...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently came across to a diverse portfolio of fake security software also known as scareware courtesy of the Koobface gang in what appears to be a direct connection between the...
View ArticleDancho Danchev's Blog - Mind Streams of Information Security Knowledge:...
It's 2010 and I've recently decided to provide actionable intelligence on a variety of 419-themed scams in particular the actual malicious actors behind the campaigns with the idea to empower law...
View Article