ethicalhackersacademy
python tools

Most Important Python Tools for Ethical Hackers & Penetration Testers

There are a variety of python tools are using in the cybersecurity industries and the python is one of the widely used...
5ss5c Ransomware

New 5ss5c Ransomware Attacks Windows Computer Encrypts Only Selected Files and Stop Database-related Services

A new ransomware strain dubbed 5ss5c encrypts only certain files and stops database-related services and processes. 5ss5c ransomware believed...
PowerPoint Malware

Heavily Obfuscated Malware Campaign using Weaponized PowerPoint Files to Drop Lokibot & Azorult

A new malware campaign utilizes PowerPoint files to deliver the Lokibot info stealer or Azorult remote access trojan. Security...
Types of Malware

10 Different Types of Malware Attack and How to Avoid them

Today's topic is basically about types of malware, yes, it's a malicious software which is basically designated to damage, impair, or exploit...
Malware

What is Malware? Removal and Prevention

Malware is a software or malicious code that is specifically designed for gaining access to an end-user machine or network. Attackers try to...

Free BlueKeep Detection Tool to Test Your Windows Machines for Against RDP Vulnerability

BlueKeep is a remote code execution vulnerability that exists in Remote Desktop Services that allows an unauthenticated attacker to establish a connection...
Imminent Monitor

Imminent Monitor – A RAT That Allow Hackers to Gain Full Control of the...

Researchers from Palo Alto Networks break down the illegitimate remote access tool "Imminent Monitor" that allows an attacker to gain full control...
OSINT Tools

Top 10 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing – 2020

We all know very well that getting or gathering any information by using various tools become really easy. In this article, we...
Imminent Monitor

Authorities Taken Down The Hacking Tool “IM-RAT” that Gives Full Control of a Victim’s...

Authorities have taken down the Imminent Monitor Remote Access Trojan (IM-RAT) that used by cybercriminals to gain full control over the victim's...
Threat Analysis Group

More Than 12,000 Windows Users Attacked by Government-backed Hackers – Google’s Threat Analysis Group...

Google's Threat Analysis Group(TAG) has sent more than 12,000 warnings to users in 149 countries targeted by government-backed attackers. The warnings found...