Editor_In_Chief

Editor_In_Chief

Last seen: 2 days ago

An award-winning political journalist formerly with Nigerian Tribune Newspaper with almost two decades reporting news across the globe. I expose and report on government censorship and focus on freedom of speech as a vehicle to be truly free from the oppression of government dictatorship.

Member since May 13, 2019 editor_darkrebel.net@protonmail.com

Following (7)

Followers (1)

Exploits
ScareCrow - Payload Creation Framework Designed Around EDR Bypass

ScareCrow - Payload Creation Framework Designed Around...

If you want to learn more about the techniques utlized in this framework please...

Latest Threats
Cisco Warns of Critical Auth-Bypass Security Flaw

Cisco Warns of Critical Auth-Bypass Security Flaw

Cisco also stomped out a critical security flaw affecting its Nexus 3000 Series...

Latest Threats
Malicious Mozilla Firefox Extension Allows Gmail Takeover

Malicious Mozilla Firefox Extension Allows Gmail Takeover

The malicious extension, FriarFox, snoops in on both Firefox and Gmail-related data.

Latest Threats
Health Website Leaks 8 Million COVID-19 Test Results

Health Website Leaks 8 Million COVID-19 Test Results

A teenaged ethical hacker discovered a flawed endpoint associated with a health-department...

Latest Threats
Cyberattacks Launch Against Vietnamese Human-Rights Activists

Cyberattacks Launch Against Vietnamese Human-Rights Activists

Vietnam joins the ranks of governments using spyware to crack down on human-rights...

Exploits
APT-Hunter - Threat Hunting Tool For Windows Event Logs Which Made By Purple Team Mindset To Provide Detect APT Movements Hidden In The Sea Of Windows Event Logs To Decrease The Time To    Uncover Suspicious Activity

APT-Hunter - Threat Hunting Tool For Windows Event Logs...

APT-Hunter is Threat Hunting tool for windows event logs which made by purple team...

Exploits
Kali Linux 2021.1 - Penetration Testing and Ethical Hacking Linux Distribution

Kali Linux 2021.1 - Penetration Testing and Ethical Hacking...

Time for another Kali Linux release! – Kali Linux 2021.1. This release has various...

Latest Threats
Mozilla Patches Bugs in Firefox, Now Blocks Cross-Site Cookie Tracking

Mozilla Patches Bugs in Firefox, Now Blocks Cross-Site...

Mozilla said its Total Cookie Protection feature in Firefox 86 prevents invasive,...

Latest Threats
Tax Season Ushers in Quickbooks Data-Theft Spike

Tax Season Ushers in Quickbooks Data-Theft Spike

Quickbooks malware targets tax data for attackers to sell and use in phishing scams.

Latest Threats
Microsoft Lures Populate Half of Credential-Swiping Phishing Emails

Microsoft Lures Populate Half of Credential-Swiping Phishing...

As more organizations migrate to Office 365, cybercriminals are using Outlook, Teams...

Exploits
BugBountyScanner - A Bash Script And Docker Image For Bug Bounty Reconnaissance

BugBountyScanner - A Bash Script And Docker Image For Bug...

A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless...

Latest Threats
Nvidia’s Anti-Cryptomining GPU Chip May Not Discourage Attacks

Nvidia’s Anti-Cryptomining GPU Chip May Not Discourage...

The hotly anticipated GeForce RTX 3060, a ray-tracing-friendly, advanced gaming...

Latest Threats
VMWare Patches Critical RCE Flaw in vCenter Server

VMWare Patches Critical RCE Flaw in vCenter Server

The vulnerability, one of three patched by the company this week, could allow threat...

Exploits
BlackMamba - C2/post-exploitation Framework

BlackMamba - C2/post-exploitation Framework

BlackMamba is a multi client C2/post exploitation framework with some spyware features....

Politics & Governance
How Do Copyright Rules Affect Internet Creators? And What Can They Do About It?

How Do Copyright Rules Affect Internet Creators? And What...

If you make and share things online, professionally or for fun, you’ve been affected...

Politics & Governance
Student Surveillance Vendor Proctorio Files SLAPP Lawsuit to Silence A Critic

Student Surveillance Vendor Proctorio Files SLAPP Lawsuit...

During the pandemic, a dangerous business has prospered: invading students’ privacy...

Politics & Governance
Cops Using Music to Try to Stop Being Filmed Is Just the Tip of the Iceberg

Cops Using Music to Try to Stop Being Filmed Is Just the...

Someone tries to livestream their encounters with the police, only to find that...

Politics & Governance
Racial and Immigrant Justice Groups Sue Government for Records of COVID-19 Data Surveillance

Racial and Immigrant Justice Groups Sue Government for...

Just Futures Law, MediaJustice, Mijente, Immigrant Defense Project and Electronic...

Politics & Governance
EFF to First Circuit: Schools Should Not Be Policing Students’ Weekend Snapchat Posts

EFF to First Circuit: Schools Should Not Be Policing Students’...

This blog post was co-written by EFF intern Haley Amster. EFF filed an amicus brief in...

Exploits
bg
HaE - BurpSuite Highlighter And Extractor

HaE - BurpSuite Highlighter And Extractor

HaE is used to highlight HTTP requests and extract information from HTTP response...

Exploits
bg
RAT-el - An Open Source Penetration Test Tool That Allows You To Take Control Of A Windows Machine

RAT-el - An Open Source Penetration Test Tool That Allows...

RAT-el is an open source penetration test tool that allows you to take control of...

Exploits
bg
Remote-Method-Guesser - Tool For Java RMI Enumeration And Bruteforce Of Remote Methods

Remote-Method-Guesser - Tool For Java RMI Enumeration And...

remote-method-guesser (rmg) is a command line utility written in Java and can be...

Exploits
bg
Horusec - An Open Source Tool That Improves Identification Of Vulnerabilities In Your Project With Just One Command

Horusec - An Open Source Tool That Improves Identification...

Horusec is an open source tool that performs static code analysis to identify security...

Exploits
bg
Perfusion - Exploit For The RpcEptMapper Registry Key Permissions Vulnerability (Windows 7 / 2088R2 / 8 / 2012)

Perfusion - Exploit For The RpcEptMapper Registry Key Permissions...

On Windows 7, Windows Server 2008R2, Windows 8, and Windows Server 2012, the registry...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here