Editor_In_Chief

Editor_In_Chief

Last seen: 2 months ago

An award-winning political journalist formerly with Nigerian Tribune Newspaper with almost two decades reporting news across the globe. I expose and report on government censorship and focus on freedom of speech as a vehicle to be truly free from the oppression of government dictatorship.

Member since May 13, 2019 editor_darkrebel.net@protonmail.com

Following (8)

Followers (1)

Exploits
Tetanus - Mythic C2 Agent Targeting Linux And Windows Hosts Written In Rust

Tetanus - Mythic C2 Agent Targeting Linux And Windows Hosts...

Tetanus is a Windows and Linux C2 agent written in rust. Installation To install...

Exploits
Zphisher-GUI-Back_office - A Zphisher GUI Back-Office Plugin

Zphisher-GUI-Back_office - A Zphisher GUI Back-Office Plugin

DISCLAIMER This toolkit contains materials that can be potentially damaging or dangerous...

Latest Threats
380K Kubernetes API Servers Exposed to Public Internet

380K Kubernetes API Servers Exposed to Public Internet

More than 380,000 of the 450,000-plus servers hosting the open-source container-orchestration...

Latest Threats
Closing the Gap Between Application Security and Observability

Closing the Gap Between Application Security and Observability

Daniel Kaar, global director application security engineering at Dynatrace, highlights...

Politics & Governance
New Surveillance Transparency Report Documents an Urgent Need for Change

New Surveillance Transparency Report Documents an Urgent...

The U.S. Intelligence Community (IC) has released its Annual Statistical Transparency...

Exploits
PowerProxy - PowerShell SOCKS Proxy With Reverse Proxy Capabilities

PowerProxy - PowerShell SOCKS Proxy With Reverse Proxy...

PowerShell SOCKS proxy with reverse proxy capabilities. PowerProxy is written with...

Latest Threats
Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover

Critical Vulnerability in Premium WordPress Themes Allows...

Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects...

Latest Threats
April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell

April VMware Bugs Abused to Deliver Mirai Malware, Exploit...

Researchers say a GitHub proof-of-concept exploitation of recently announced VMware...

Politics & Governance
We Finally Have a Federal Fiber Broadband Plan

We Finally Have a Federal Fiber Broadband Plan

There is a lot to appreciate in the recently published “Notice of Funding Opportunity”...

Latest Threats
APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

APTs Overwhelmingly Share Known Vulnerabilities Rather...

Research indicates that organizations should make patching existing flaws a priority...

Latest Threats
DOJ Says Doctor is Malware Mastermind

DOJ Says Doctor is Malware Mastermind

The U.S. Department of Justice indites middle-aged doctor, accusing him of being...

Latest Threats
iPhones Vulnerable to Attack Even When Turned Off

iPhones Vulnerable to Attack Even When Turned Off

Wireless features Bluetooth, NFC and UWB stay on even when the device is powered...

Latest Threats
Sysrv-K Botnet Targets Windows, Linux

Sysrv-K Botnet Targets Windows, Linux

Microsoft researchers say they are tracking a botnet that is leveraging bugs in...

Politics & Governance
Two of Peru's Top ISPs Improve Transparency Practices, While Two Competitors Lag Behind, New Hiperderecho's Report Shows

Two of Peru's Top ISPs Improve Transparency Practices,...

Peru’s top two telecom operators Movistar (Telefónica) and Claro (América Móvil)...

Politics & Governance
DOJ’s New CFAA Policy is a Good Start But Does Not Go Far Enough to Protect Security Researchers

DOJ’s New CFAA Policy is a Good Start But Does Not Go Far...

The Computer Fraud and Abuse Act (CFAA), the notoriously vague anti-hacking law,...

Exploits
C2concealer - Command Line Tool That Generates Randomized C2 Malleable Profiles For Use In Cobalt Strike

C2concealer - Command Line Tool That Generates Randomized...

C2concealer is a command line tool that generates randomized C2 malleable profiles...

Exploits
ShadowClone - Unleash The Power Of Cloud

ShadowClone - Unleash The Power Of Cloud

ShadowClone allows you to distribute your long running tasks dynamically across...

Exploits
Cyph - Cryptographically Secure Messaging And Social Networking Service

Cyph - Cryptographically Secure Messaging And Social Networking...

Cyph is a cryptographically secure messaging and social networking service, providing...

Politics & Governance
EFF, Al Sur Launch Guide to Raise Awareness About Deficiencies in Cross-Border Surveillance Treaty and Strategies to Mitigate Human Rights Risks

EFF, Al Sur Launch Guide to Raise Awareness About Deficiencies...

Download the report Latin American countries have a choice to make in the coming...

Politics & Governance
British Citizen Alaa Abd El Fattah Demands An End to Mistreatment in Egyptian Prison

British Citizen Alaa Abd El Fattah Demands An End to Mistreatment...

Egyptian blogger, coder, and free speech activist Alaa Abd El Fattah is on day 45...

Politics & Governance
Podcast Episode: An AI Hammer in Search of a Nail

Podcast Episode: An AI Hammer in Search of a Nail

It often feels like machine learning experts are running around with a hammer, looking...

Politics & Governance
EFF to Supreme Court: Put Texas Social Media Law Back on Hold

EFF to Supreme Court: Put Texas Social Media Law Back on...

Users Should Be Able to Choose Among Platforms With Different Moderation PoliciesWASHINGTON,...

Exploits
Vaas - Verdict-as-a-Service SDKs: Analyze Files For Malicious Content

Vaas - Verdict-as-a-Service SDKs: Analyze Files For Malicious...

Verdict-as-a-Service (VaaS) is a service that provides a platform for scanning files...

Exploits
Grafiki - Threat Hunting Tool About Sysmon And Graphs

Grafiki - Threat Hunting Tool About Sysmon And Graphs

Grafiki is a Django project about Sysmon and graphs, for the time being. In my opinion...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here