Install And Secure – A Guide To Using ‘ldeep’ With Kerberos For Advanced Active Directory Analysis

2 years ago

In the realm of network security and Active Directory assessment, efficient reconnaissance is paramount. This article explores the installation and…

LdrLibraryEx – A Lightweight x64 Library For Loading DLLs Into Memory

2 years ago

A small x64 library to load dll's into memory. n the world of software development, efficient DLL loading is a…

GCR – Google Calendar RAT

2 years ago

Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those…

Technical Analysis Of BiBi – Windows Wiper Targeting Israeli Organizations

2 years ago

On 30th October, Security Joes Incident Response team discovered a new Linux Wiper named "BiBi-Linux" Wiper been deployed by Pro-Hamas Hacktivist group to destroy…

Exploring Tunneling Solutions – A Comprehensive Guide For Self-Hosters And Developers

2 years ago

The purpose of this list is to track and compare tunneling solutions. This is primarily targeted toward self-hosters and developers…

ShellSpeak : AI-Powered Terminal Enhancement

2 years ago

ShellSpeak is an interactive command-line interface that enhances the terminal experience by integrating AI-driven command translation and execution. The core…

JSpector – Automated JavaScript Analysis In Burp Suite

2 years ago

JSpector is a Burp Suite extension that passively crawls JavaScript files and automatically creates issues with URLs, endpoints and dangerous…

Scrcpy v2.2 – Exploring Camera Capture, Android 14 Compatibility, and More

2 years ago

Welcome to the latest update on scrcpy, where we dive into the exciting world of scrcpy v2.2. In this release,…

Web Path Finder – Unlocking Website Insights For Comprehensive Web Information

2 years ago

Web Path Finder is a Python program that provides information about a website. It retrieves various details such as page…

CloudPulse – AWS Cloud Landscape Search Engine

2 years ago

During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later…