Skip to content
June 6, 2025
  • New ransomware decryptor “White Phoenix”
  • BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool
  • Browser Hacking with BeEF
  • Best Vulnerability Scanners for Kali Linux
Cyber ProssCyber Pross

Cyber Pross

Cyber Pross

  • Home
  • News
  • Malware
  • Learning
  • Dark Web Resources
  • Tools
  • Chrome Extension
  • Cryptography
  • Privacy Policy
Latest
  • New ransomware decryptor “White Phoenix”

    2 years ago2 weeks ago
  • BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool

    2 years ago2 weeks ago
  • Browser Hacking with BeEF

    2 years ago2 weeks ago
  • Best Vulnerability Scanners for Kali Linux

    2 years ago2 weeks ago
  • Play Ransomware

    2 years ago2 weeks ago
  • Pen Andro – Android Pen Testing Tool

    2 years ago2 weeks ago
  • PentestGPT Tool and Guide

    2 years ago
  • LockBit Ransomware v2.0

    2 years ago
  • iOS Pen Testing : Tools & Step by Step Guide

    2 years ago
  • BLACKEYE – Open Source LAN Phishing Tool for Penetration Testing

    2 years ago
  • Home
  • Malware

Malware

  • Malware

New ransomware decryptor “White Phoenix”

Cyber2 years ago2 weeks ago07 mins

A new ransomware decryptor known as ‘White Phoenix’ allows victims to partially recover files encrypted by ransomware strains that use…

Read More
  • Malware

Play Ransomware

Cyber2 years ago2 weeks ago031 mins

PLAY CTI PLAY Ransomware (aka PlayCrypt) campaigns have been active since at least mid-July 2022. Up to five ransom notes…

Read More
  • Malware

LockBit Ransomware v2.0

Cyber2 years ago0151 mins

LockBit CTI On 4 February 2022, the FBI issued FLASH security advisory on Indicators of Compromise (IOCs) associated with LockBit…

Read More
  • Malware

Babuk Ransomware

Cyber2 years ago016 mins

Babuk Ransomware Overview This is the report for the new Babuk Ransomware that recently appears at the beginning of 2021….

Read More

Recent Posts

  • New ransomware decryptor “White Phoenix”
  • BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool
  • Browser Hacking with BeEF
  • Best Vulnerability Scanners for Kali Linux
  • Play Ransomware

Recent Comments

No comments to show.

Archives

  • July 2023
  • May 2023

Categories

  • Learning
  • Malware
  • Tools
© 2025 CyberPross. All Rights Reserved.
  • Cookie Policy (EU)
  • Privacy Policy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}