Editor_In_Chief

Editor_In_Chief

Last seen: 12 days ago

An award-winning political journalist formerly with Nigerian Tribune Newspaper with almost two decades reporting news across the globe. I expose and report on government censorship and focus on freedom of speech as a vehicle to be truly free from the oppression of government dictatorship.

Member since May 13, 2019 editor_darkrebel.net@protonmail.com

Following (8)

Followers (1)

Exploits
FakeDataGen - Full Valid Fake Data Generator

FakeDataGen - Full Valid Fake Data Generator

FakeDataGen is a Full Valid Fake Data Generator.This tool helps you to create fake...

Exploits
goEnumBruteSpray - User Enumeration And Password Bruteforce On Azure, ADFS, OWA, O365 And Gather Emails On Linkedin

goEnumBruteSpray - User Enumeration And Password Bruteforce...

The recommended module is o365 for user enumeration and passwords bruteforce / spray...

Exploits
LOLBins - PyQT5 App For LOLBAS And GTFOBins

LOLBins - PyQT5 App For LOLBAS And GTFOBins

PyQT app to list all Living Off The Land Binaries and Scripts for Windows from LOLBAS...

Latest Threats
New Twists on Gift-Card Scams Flourish on Black Friday

New Twists on Gift-Card Scams Flourish on Black Friday

Fake merchandise and crypto jacking are among the new ways cybercriminals will try...

Latest Threats
Attackers Actively Target Windows Installer Zero-Day

Attackers Actively Target Windows Installer Zero-Day

Researcher discovered a “more powerful” variant of an elevation-of-privilege flaw...

Exploits
Cracken - A Fast Password Wordlist Generator, Smartlist Creation And Password Hybrid-Mask Analysis Tool

Cracken - A Fast Password Wordlist Generator, Smartlist...

Cracken is a fast password wordlist generator, Smartlist creation and password hybrid-mask...

Latest Threats
Apple’s NSO Group Lawsuit Amps Up Pressure on Pegasus Spyware-Maker

Apple’s NSO Group Lawsuit Amps Up Pressure on Pegasus Spyware-Maker

Just weeks after a judge ruled that NSO Group did not have immunity in a suit brought...

Latest Threats
GoDaddy Breach Widens to Include Reseller Subsidiaries

GoDaddy Breach Widens to Include Reseller Subsidiaries

Customers of several brands that resell GoDaddy Managed WordPress have also been...

Latest Threats
9.3M+ Androids Running ‘Malicious’ Games from Huawei AppGallery

9.3M+ Androids Running ‘Malicious’ Games from Huawei AppGallery

A new trojan called Android.Cynos.7.origin, designed to collect Android users’ device...

Exploits
ELFXtract - An Automated Analysis Tool Used For Enumerating ELF Binaries

ELFXtract - An Automated Analysis Tool Used For Enumerating...

ELFXtract is an automated analysis tool used for enumerating ELF binaries Powered...

Latest Threats
Common Cloud Misconfigurations Exploited in Minutes, Report

Common Cloud Misconfigurations Exploited in Minutes, Report

Opportunistic attackers instantly exploited insecurely exposed services deployed...

Latest Threats
Attackers Will Flock to Crypto Wallets, Linux in 2022:  Podcast

Attackers Will Flock to Crypto Wallets, Linux in 2022:...

That’s just the start of what cyberattackers will zero in on as they pick up APT...

Politics & Governance
Coalition Against Stalkerware Celebrates Two Years of Work to Keep Technology Safe for All

Coalition Against Stalkerware Celebrates Two Years of Work...

In this guest post by the Coalition Against Stalkerware marking its second anniversary,...

Exploits
Nanobrok - Web Service For Control And Protect Your Android Device Remotely

Nanobrok - Web Service For Control And Protect Your Android...

Web Service write in Python for control and protect your android device remotely. The...

Exploits
Whoc - A Container Image That Extracts The Underlying Container Runtime

Whoc - A Container Image That Extracts The Underlying Container...

A container image that extracts the underlying container runtime and sends it to...

Exploits
Redherd Framework -A Collaborative And Serverless Framework For Orchestrating A Geographically Distributed Group Of Assets

Redherd Framework -A Collaborative And Serverless Framework...

RedHerd is a collaborative and serverless framework for orchestrating a geographically...

Politics & Governance
Manifest V3: Open Web Politics in Sheep's Clothing

Manifest V3: Open Web Politics in Sheep's Clothing

When Google introduced Manifest V3 in 2019, web extension developers were alarmed...

Politics & Governance
EU Parliament Takes First Step Towards a Fair and Interoperable Market

EU Parliament Takes First Step Towards a Fair and Interoperable...

The EU’s Proposal for a Digital Market Act (DMA) is an attempt to create a fairer...

Politics & Governance
Podcast Episode: The Revolution Will Be Open Source

Podcast Episode: The Revolution Will Be Open Source

Episode 102 of EFF’s How to Fix the Internet The open source movement focuses on...

Politics & Governance
Indonesian Court Allows Internet Blocking During Unrest, Tightening Law Enforcement Control Over Users’ Communications and Data

Indonesian Court Allows Internet Blocking During Unrest,...

Indonesia’s Constitutional Court dealt another blow to the free expression and online...

Politics & Governance
UN Human Rights Committee Criticizes Germany’s NetzDG for Letting Social Media Platforms Police Online Speech

UN Human Rights Committee Criticizes Germany’s NetzDG for...

A UN human rights committee examining the status of civil and political rights in...

Exploits
UDP-Hunter - Network Assessment Tool For Various UDP Services Covering Both IPv4 And IPv6 Protocols

UDP-Hunter - Network Assessment Tool For Various UDP Services...

UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on...

Exploits
Whispers - Identify Hardcoded Secrets In Static Structured Text

Whispers - Identify Hardcoded Secrets In Static Structured...

"My little birds are everywhere, even in the North, they whisper to me the strangest...

Exploits
ThreadBoat - Program Uses Thread Execution Hijacking To Inject Native Shell-code Into A Standard Win32 Application

ThreadBoat - Program Uses Thread Execution Hijacking To...

Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application.AboutI...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here