Valid8Proxy: Streamlining Proxy Management for Web Scraping and Network Security

2 years ago

Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for…

CATSploit: Revolutionizing Automated Penetration Testing with Cyber Attack Techniques Scoring (CATS) Method

2 years ago

CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester.…

Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.

2 years ago

The article "Demonized Shell: Advancing Linux Persistence Techniques and Security Implications" goes into great detail about D3m0n1z3dShell, a complex tool…

EDRSilencer: A Tool for Managing EDR Outbound Traffic with Windows Filtering Platform.

2 years ago

Inspired by the closed source FireBlock tool FireBlock from MdSec NightHawk, I decided to create my own version and this tool was…

Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets.

2 years ago

Of course! The piece "Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets" talks about a new tool for…

Red-Teamer Diaries: Insights and Techniques for Effective Penetration Testing

2 years ago

Publicly accessible notes about my pentesting/red teaming experiments tested on several controlled environments/infrastructures that involve playing with various tools and…

Windows Local Privilege Escalation Cookbook (In Progress)

2 years ago

Description (Keynote) This Cookbook was created with the main purpose of helping people understand local privilege escalation techniques on Windows…

HackBrowserData: A Comprehensive Guide to Decrypting and Exporting Data from Popular Browsers

2 years ago

HackBrowserData is a command-line tool for decrypting and exporting browser data ( passwords, history, cookies, bookmarks, credit cards, download records, localStorage…

Linpmem – A Physical Memory Acquisition Tool for Linux

2 years ago

Linpmem is a Linux x64-only tool for reading physical memory. Like its Windows counterpart, Winpmem, this is not a traditional memory…

Process Stomping: Advanced Technique for Executing Shellcode in Targeted Executable Sections

2 years ago

Cybersecurity is a field that is always changing, and new techniques are always being made to improve both offensive and…