Skip to content

October 28, 2025

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Digital Attack Map
    • Real-time web monitor AKAMAI
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

network

Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap

Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams.

With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.

PhanTap is silent in the network an…

August 7, 2019
0 comment
Read More >>

CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible

CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible 

Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before using.

CloudFail is a tactical reconnaissance t…

August 2, 2019
0 comment
Read More >>

RedGhost – Linux Post Exploitation Framework

RedGhost- Linux post exploitation framework 

It has designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. 

Payloads

Function to generate various encoded reverse shells in netcat, bash…

July 19, 2019
0 comment
Read More >>

Pyshark- To Allowing Python Packet Parsing Using Wireshark Dissectors

Python wrapper for tshark, allowing python packet parsing using Wireshark dissectors.

Pyshark features a few “Capture” objects (Live, Remote, File, InMem). Each of those files read from their respective source and then can be used as an iterator…

July 16, 2019
0 comment
Read More >>

TOR Router- To Use As Transparent Proxy And Send Traffic Under TOR

TOR Router- A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.

Tor Router allow you to use TOR as a transparent p…

June 12, 2019
0 comment
Read More >>
1 … 4 5 6

Archives

October 2025
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Sep    

Recent Posts

  • Today in Spain: A roundup of the latest news on Tuesday October 28, 2025
  • WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804) October 28, 2025
  • Mining execs embrace ‘phenomenal’ rare earths interest from the Middle East October 28, 2025
  • Managing legacy medical devices that can no longer be patched October 28, 2025
  • Google and NextEra to revive major Iowa nuclear facility as AI energy demand surges October 28, 2025
  • UAE: Dubai 24K gold prices drop below Dh 500 per gram after record high Diwali rate October 28, 2025
  • President Trump’s Trip to Asia October 28, 2025

Categories Cloud

africa (3449) Americas (36696) AM Update (4369) Army (3802) Australia news (8548) Business (11160) China (5024) Culture (3479) Cyber Security (3951) cybersecurity (3305) Cyber Security News (4375) Donald Trump (4603) Environment (4569) Europe (16176) Foreign Policy (3893) france (3892) Hacking (7545) Health (3420) homesecurity (3635) IFP Exclusive (3322) India (9449) Israel (4950) Mary Patriot News (4801) Media Wire (5165) middle east (5707) Nation (10103) Nation, Nation & World (5408) Nation, World (9817) News (36599) politics (7735) russia (6400) Security (6218) Society (3199) Sports (8217) Tankers (4116) Technology (3546) UK news (17910) ukraine (5686) Uncategorized (3695) US Crime News (6222) US news (13151) US politics (20651) World (77387) World news (24584) worldNews (27831)
RSS Error: A feed could not be found at `https://nvd.nist.gov/download/nvd-rss-analyzed.xml`; the status code is `404` and content-type is `text/html;charset=UTF-8`

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

October 2025
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Sep    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive