Xenon : A New Tool In The Mythic Framework

2 hours ago
Varshini

Xenon is a Windows agent designed for the Mythic framework, inspired by tools like Cobalt Strike. It is currently in…

OSCP : Navigating The Essential Toolkit For Penetration Testing

2 hours ago

The OSCP (Offensive Security Certified Professional) certification is a highly respected credential in the cybersecurity industry, focusing on hands-on penetration…

Famatech Advanced IP Scanner Or Advanced Port Scanner Usage

2 hours ago

Famatech offers two powerful network management tools: Advanced IP Scanner and Advanced Port Scanner. Both tools are designed to enhance…

ELF Loader And PS5-JAR-Loader : Tools For Enhanced Functionality

2 hours ago

In the realm of PlayStation 5 (PS5) development, two significant tools have emerged to enhance the console's capabilities: the ELF…

C2IntelFeeds : Enhancing Cybersecurity With Threat Intelligence

4 hours ago

C2IntelFeeds is a powerful tool designed to provide actionable threat intelligence to cybersecurity professionals. It offers a comprehensive set of…

goLAPS : The Ultimate Guide To Managing LAPS Passwords with Golang

6 hours ago

goLAPS is a tool designed to interact with the Local Administrator Password Solution (LAPS) in a domain environment. It allows…

200-OK-Modifier : Mastering Web Application Analysis And Penetration Testing

6 hours ago

The 200-OK-Modifier is a versatile Burp extension that allows users to modify server response codes in real-time, specifically changing them…

NullGate : Advancing Evasion Techniques In Windows Exploitation

1 day ago

NullGate is a sophisticated project designed to leverage NTAPI functions using indirect syscalls, incorporating the FreshyCalls method with a novel…

WebHunt : A Dive Into Web App Testing For Bug Bounty Hunting

1 day ago

WebHunt is an innovative project that focuses on web application testing, particularly for bug bounty hunting. It leverages powerful tools…

Process Ghosting In Rust : Crafting Evasive Applications On Windows

1 day ago

Process ghosting is a sophisticated technique used to evade detection by security tools on Windows systems. It involves creating a…