linWinPwn – Active Directory Vulnerability Scanner

2 years ago

A versatile bash script designed for automating Active Directory enumeration and vulnerability assessment. By leveraging a curated selection of tools…

WDAC Rule Levels Comparison And Guide – Understanding File Attribute-Based Security Measures

2 years ago

We delve into the hierarchy of WDAC rule levels, ranging from the most secure to the least secure, providing insight…

SharpADWS – Red Team’s Secret Weapon For Active Directory Reconnaissance

2 years ago

A groundbreaking tool revolutionizing Active Directory reconnaissance for Red Teams. By leveraging the obscure Active Directory Web Services (ADWS) protocol,…

MinDNS – A Lightweight Rust-Based DNS Server For Enhanced Network Security

2 years ago

Delve into the realm of network security with MinDNS, a lightweight DNS server crafted in Rust. Designed for versatility, it…

DarkWidow – A Stealthy Windows Dropper And Post-Exploitation Tool

2 years ago

A formidable tool tailored for both dropper and post-exploitation scenarios on Windows systems. With its sophisticated capabilities including dynamic syscall…

Cobalt-Strike-Profiles-For-EDR-Evasion + SourcePoint Is A C2 Profile Generator For Cobalt Strike

2 years ago

Bypassing Memory Scanners The recent versions of Cobalt Strike have made it so easy for the operators to bypass memory…

Living Off The LandLeaked Certificates (LoLCerts) – Unveiling The Underworld

2 years ago

Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates. This threat is…

Powershell Digital Forensics And Incident Response (DFIR) – Leveraging Scripts For Effective Cybersecurity

2 years ago

This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices. The following Incident…

CVE-2023-4427 – Unveiling Chrome Vulnerability Exploitation And Mitigation Strategies

2 years ago

In this article, we delve into the intricacies of a recently discovered vulnerability in Google Chrome, identified as CVE-2023-4427. Discovered…

CVE-2024-20931 – Bypassing Patched Vulnerabilities In Oracle WebLogic

2 years ago

A vulnerability that serves as a bypass for the patched CVE-2023-21839 in Oracle WebLogic. This article delves into the exploit's…