Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability. This exploit, developed by Alfie…
Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They ensure that hackers provide clear,…
FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained Language Mode (CLM). By doing…
Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool, Seatbelt. It includes nearly all…
Pyda is an innovative tool designed to simplify dynamic binary analysis by allowing developers to write analysis tools in Python.…
The AMD Open Source Driver for Vulkan® (AMDVLK) is a powerful, open-source Vulkan driver developed by AMD for Radeon™ graphics…
The Atomic Red Team is an open-source framework designed to help security teams emulate adversarial tactics and techniques in alignment…
SCCMHunter is a Python-based post-exploitation tool designed for security professionals to identify, profile, and exploit System Center Configuration Manager (SCCM)…
The eBPF File Creation Blocker is a cutting-edge security module designed to prevent file creation in specified directories using the…
The DeepSeek-Vulnerability-Analyzer is an innovative extension for Burp Suite that leverages AI-driven capabilities to enhance vulnerability detection and analysis. By…