Vulnerability Checklist – Comprehensive Guide For Web Applications And Frameworks

2 years ago

The security of web applications and frameworks is of paramount importance. To help ensure the safety of your systems, this…

X64dbgbinja – Bridging The Gap Between Binary Ninja And X64dbg With An Official Plugin

2 years ago

The official plugin designed to enhance the synergy between Binary Ninja and x64dbg. In this article, we'll delve into the…

v2024.1 – Unlocking The Future With Locksmith

2 years ago

Locksmith takes a significant step forward, addressing ownership issues with newfound automation. This update, led by contributors like @TrimarcJake, @techspence,…

Afrog – Empowering Bug Bounty, Pentesting, And Red Teaming With A High-Performance Security Tool

2 years ago

In the ever-evolving landscape of cybersecurity, the need for robust tools that aid Bug Bounty programs, Penetration Testing (Pentest), and…

Azure Outlook C2 – Unveiling Remote Control Of Windows Devices Via Outlook Mailbox

2 years ago

Azure Outlook Command And Control that uses Microsoft Graph API for C2 communications And data exfiltration. The intriguing world of…

CsWhispers – Supercharge Your C# Project With D/Invoke And Indirect Syscalls

2 years ago

Source generator to add D/Invoke and indirect syscall methods to a C# project. A game-changer for C# developers, CsWhispers is…

XLL Dropper – Mastering A Red Team’s Ultimate Weapon

2 years ago

Write XLL Dropper in c++ , a red teams most used dropper , learn how to be like a red…

ExecIT – Unveiling A Fileless Execution Technique Ith Undetectable DLL Shellcode

2 years ago

DLL Shellcode self-inyector/runner based on HWSyscalls, ideally thought to be executed with rundll32. May grant fileless execution if victim endpoint…

C++ Standard Library And Qt, Python, etc. Implementation in C – Reviving the Spirit of C For Enhanced Development

2 years ago

This project aims to reimplement the C++ standard library functionality using the C programming language. It provides C developers with…

Awesome GPTs (Agents) For Cybersecurity – The Ultimate Guide

2 years ago

The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity…