logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Organizations Urged to Address Critical Vulnerabilities Found in First Half of 2023
  • Analyzing the FUD Malware Obfuscation Engine BatCloak
  • Google changes email authentication after spoof shows a bad delivery for UPS
  • Employee cybersecurity awareness takes center stage in defense strategies
  • IoT Botnet DDoS Attacks Threaten Global Telecom Networks, Nokia

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-20752 (android) 6 June 2023
  • CVE-2023-20751 (android) 6 June 2023
  • CVE-2023-20750 (android) 6 June 2023
  • CVE-2023-20749 (android) 6 June 2023
  • CVE-2023-20742 (android) 6 June 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

pwncat – netcat on steroids with Firewall, IDS/IPS evasion, and its fully scriptable with Python (PSE)

Posted on 5 June 2020

From hakin9.org

Pwncat is a sophisticated bind and reverses shell handler with many features as well as a drop-in replacement or compatible complement to netcat, ncat or socat.

Read more…

Posted in News

Post navigation

Previous post: Business services giant Conduent hit by Maze Ransomware
Next post: This new ransomware is targeting Windows and Linux PCs with a ‘unique’ attack
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.