PipeViewer – Exploring Windows Named Pipes For Security And Permissions

2 years ago

PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is…

MetaHub – Revolutionizing Vulnerability Management With Contextual Impact Evaluation

2 years ago

MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management. You can use it with AWS…

Nysm : Unveiling The Art Of Stealthy eBPF Post-Exploitation Containers

2 years ago

In the ever-evolving landscape of cybersecurity, offensive tools based on eBPF (Extended Berkeley Packet Filter) have gained popularity, from credential…

Exploring Best EDR Of The Market (BEOTM) : Unveiling User-Mode Evasion Techniques and Defensive Strategies

2 years ago

BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) project, designed to serve as a testing ground for understanding…

Valid8Proxy: Streamlining Proxy Management for Web Scraping and Network Security

2 years ago

Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for…

CATSploit: Revolutionizing Automated Penetration Testing with Cyber Attack Techniques Scoring (CATS) Method

2 years ago

CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester.…

Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.

2 years ago

The article "Demonized Shell: Advancing Linux Persistence Techniques and Security Implications" goes into great detail about D3m0n1z3dShell, a complex tool…

EDRSilencer: A Tool for Managing EDR Outbound Traffic with Windows Filtering Platform.

2 years ago

Inspired by the closed source FireBlock tool FireBlock from MdSec NightHawk, I decided to create my own version and this tool was…

Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets.

2 years ago

Of course! The piece "Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets" talks about a new tool for…

Red-Teamer Diaries: Insights and Techniques for Effective Penetration Testing

2 years ago

Publicly accessible notes about my pentesting/red teaming experiments tested on several controlled environments/infrastructures that involve playing with various tools and…