Search results for Java-based open-source
T3SF - Technical Tabletop Exercises Simulation Framework...
T3SF is a framework that offers a modular structure for the orchestration of events...
Source: KitPloit

Fortune-telling website WeMystic exposes 13M+ user...
WeMystic, a website on astrology, numerology, tarot, and spiritual orientation,...
Source: Security Affairs

How To Recognize Macro Encrypted Strings in Malware...
How to identify when a macro is used to encrypt strings in malware... inferring...
Source: OALabs

New FjordPhantom Android Malware Targets Banking Apps...
Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that...
Source: The Hacker News

Aladdin - Payload Generation Technique That Allows...
Aladdin is a payload generation technique based on the work of James Forshaw (@tiraniddo)...
Source: KitPloit

CISA adds ownCloud and Google Chrome bugs to its Known...
US CISA added ownCloud and Google Chrome vulnerabilities to its Known Exploited...
Source: Security Affairs

Hackers without borders
HWB, for a better world in cyberspace. Hackers Without Borders is an international...

Announcing IWCON 2023 Speakers Final Batch
Register today to be a part of the coolest Cybersecurity conference and end 2023...
Source: InfoSec Write-ups
-1.webp)
Notepad++ Input Validation Flaws Leads to uncontrolled...
Notepad++ has been discovered with an uncontrolled search path vulnerability, which...
Source: Latest Hacker and Security News

U.S. Treasury Sanctions North Korean Kimsuky Hackers...
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on...
Source: The Hacker News

Securing our home labs: Home Assistant code review
The GitHub Security Lab examined the most popular open source software running on...
Source: The GitHub Blog
Windiff - Web-based Tool That Allows Comparing Symbol,...
WinDiff is an open-source web-based tool that allows browsing and comparing symbol,...
Source: KitPloit