Certutil module #APT34
#Certutil_Concept Many attacks in recent years, such as the #APT34, have used the Certutil module, due to the fact that Certutil has two very attractive features for hackers Certutil is…
We See What Others Cannot
#Certutil_Concept Many attacks in recent years, such as the #APT34, have used the Certutil module, due to the fact that Certutil has two very attractive features for hackers Certutil is…
گردانهای سایبری بسیج برای مقابله با هجمه دشمنان در فضای مجازی فعالیت میکنند (Featured image compliments of #Iranwire) Commander of West Azeri Martyrs Corps said the activities of Basij groups…
From indictments and the indicted to commercial organizations, academia, and cybersecurity conferences and organizations. The indicted Mojtaba Masoumpour maintained a company with current Iranian academics and cybersecurity professionals accepted…
#Basij #Cyber #Battalions "We must simultaneously attack the enemy in cyberspace. Use creativity and counteract the threat of the enemy by leveraging opportunities. In such circumstances, they may restrict or…
In their words: "We are exposing here more of vicious activities of Ministry Of Intelligence of Islamic Republic of iran that includes damn hacking of King of Fahad hospital National…
Work done in the first 3 months of the year 97 Objectives: 1- Collecting information from the Kuwaiti Divan Organization Portals (mail.da-admin.gov.kw) 2- Receiving 1 terabyte of Bahraini Interior Ministry…
Best Tools for Increasing Access to Linux and Windows - 2019 Full List and then some بهترین ابزارهای افزایش دسترسی لینوکس و ویندوز - « فهرست کامل 2019 » تشدید…
[wpvideo 96SZLeJ6] [wpvideo fIgkTFtK] [wpvideo VE2orS9C]
We are exposing here an important cyber tool activity used by the Iranian Ministry of Intelligence and its name is Karkoff tool for DNSpionage activity. Our evidence are exposing here…
The picture you see is US bases in the 300 to 1000 km radius of Iran. The bases that the occupants of the occupation regime see as part of their…
#Network Plus In this post, I'll outline how the hacker needs a Networks plug-in, and we'll also look at what matters in the course of the discussion, and to what…
Day one information Day 3 #Disclosure Staff and students at Tarbist Modarres University were victims of the Ministry of Intelligence! Databases at Tarbiat Modarres University have been hacked and infiltrated…
Iranians amongst others learn from the West using our tools, techniques, tactics methods in unique ways against us. We continue to provide for this education while suffering the impacts of…
You must be logged in to post a comment.