Karyar Argham (Carrier Digit) and the continued training of Iranian companies and government hackers

US training of Iranian companies and hackers continues

Iran Cyber Security Group

Best Tools for Increasing Access to Linux and Windows - 2019 Full List and then some بهترین ابزارهای افزایش دسترسی لینوکس و ویندوز - «...

Lab Dookhtegan Part 4

در پی وعده یمان در مبارزه علیه وزارت اطلاعات ما در اینجا از مشخصات شخصی شانزدهمین لکه ننگ این سازمان پرده بر می داریم. اطلاعات...

Lab Dookhtegan June 19 MOIS

.Lab Dookhtegan June 19. Tools if the trade in a database listing methods, tools, techniques, and most likely code and attack targets #iran @Labdookhtegan1 @iran...


Much has been written about Mr.Tekide and his crypters used by APT34 (OilRig) and others. Other organizations have documented information about Mr.Tekide's tools in 'celebrated'...

Solevisible Alpha Shell

new from #Solevisible

McAfee Institute next company to reward and support #Iranian hackers who target the US and our allies.


Soliciting for Intel against the MOIS and IRGC. Iranians asked to contribute – #Parastoo @ADjabehsiah. With a counter comment direct from the #IRGC

give us information about the IRGC. Release prisoners and we will negotiate. parastoo

Lab Dookhtegan Read my Lips

MOIS OilRig APT34 hacker Alireza Shahsavari

Day 2 and 3 #VAJA #MOIS data release from Parastoo as of 16:00 May 5 ETD

Day one information Day 3 #Disclosure Staff and students at Tarbist Modarres University were victims of the Ministry of Intelligence! Databases at Tarbiat Modarres University...

Rana Institute continues to spy on Iranian Citizens for the MOIS #Parastoo

#mimikatz #oilrig #muddywater #apt34 #iran #Parastoo#Reveal Disclosure of documents and activities of the non-commercial enterprise "Rana Smart Computing" from the Intelligence Detection Departments of the...

Parastoo …extract information about subjects, asylum seekers, prison staff and all intelligence operations and arrests related to the staff of the Ministry of Intelligence

https://twitter.com/Treadstone71LLC/status/1124184733179633664?s=19 Analyst and Search Engineer The comprehensive information system developed by the Cyber Security Operations Directorate (Software Development Team) of the Office of the Ministry of...

Part I – Iranian Site Hack plus months of instruction on how to hack taken from Western sources

Iranians amongst others learn from the West using our tools, techniques, tactics methods in unique ways against us. We continue to provide for this education while suffering the impacts of the cyber attacks.

Reputable? companies still training our adversaries. Show devotion to the Almighty Dollar.

The problem of making available, exporting training packages along with software continues as Iranian hackers exploit our cyber security defensive measures. Interpretation of sanction wording...

Green Leakers – InfoSec & Beyond – Lotusint – STANDBY for a possible leak on MuddyWater

Update May 1 #Muddywater #GreenLeakers The information of 7 hacktivist releated to #Muddywater operation was sold Did you know first target of #Muddywater was turkish...

Iranian Exposure – OilRig Hackers Outed update May 4

sina.ghaaf@gmail.com We are exposing here the cyber tools (APT34 / OILRIG) that the ruthless Iranian Ministry of Intelligence has been using against Iran’s neighbouring countries,...

Tapandegan @tapandegan Striking Again? May 30 2019

Tapandegan strikes? Parastoo

Offsec Conference 2019

Third Conference on Modern Achievements of Cyber and Offensive Attacks in IranThe 3rd conference from Offsec (Offensive Security - offsec.ir / offsecresearch.com / offsecmag) Offsec...

Iranian Blogger Musings and Opinions

Israeli Private Companies and Their Alignment to Israeli Intelligence #Question If the relationship between Israeli Private Companies and Israeli Intelligence is so close, and if...

The Lockheed Martin RQ-170 Drone Intercept (along with the #Muddywater hack on the F-35 in Turkey)

Hypo-Hack or actual. Either way, they did it. Iranian UAV theft of the Lockheed Martin RQ-170

%d bloggers like this: