Hades Command And Control – Learning Malware Development and CTFsHades Command & Control

2 years ago

Hades is a basic Command & Control server built using Python. It is currently extremely bare bones, but I plan…

Forbidden Buster: Mastering HTTP 401 and 403 Bypass Techniques

2 years ago

Forbidden Buster is a tool designed to automate various techniques in order to bypass HTTP 401 and 403 response codes…

Goblob: Azure Blob Storage Enumeration Tool

2 years ago

Goblob is a lightweight and fast enumeration tool designed to aid in the discovery of sensitive information exposed publicy in…

Top Penetration Testing Software & Tools – Essential for Security Assessments

2 years ago

This article offers a comprehensive overview of the nine most commonly utilized penetration testing tools in the cybersecurity domain. The…

Padre: A Powerful Tool for Exploiting Padding Oracle Attacks

2 years ago

Padre is a sophisticated and efficient software tool specifically engineered to leverage the inherent weaknesses in CBC mode encryption through…

LightsOut: Disabling AMSI & ETW with an Obfuscated DLL

2 years ago

LightsOut will generate an obfuscated DLL that will disable AMSI & ETW while trying to evade AV. This is done…

CrossLinked: Mastering LinkedIn Enumeration with Search Engine Scraping

2 years ago

CrossLinked is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from an organization. This…

Splunk RCE – PoC: In-Depth Analysis and Exploitation Methodology

2 years ago

This article delves into a critical vulnerability in Splunk, identified as CVE-2023-46214. It provides a detailed analysis and a Proof…

CVE Half-Day Watcher

2 years ago

CVE Half-Day Watcher is a security tool designed to highlight the risk of early exposure of Common Vulnerabilities and Exposures…

WhatsApp OSINT Tool: Revolutionizing Digital Investigations

2 years ago

The WhatsApp OSINT Tool is a pioneering tool developed for intelligence gathering on WhatsApp. It enables tracking and monitoring of…