LatLoader – Evading Elastic EDR In Lateral Movement

2 years ago

LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this…

Telegram Explorer (TEx) – The Ultimate Toolkit for Telegram Data Analysis

2 years ago

TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the…

HackSys Extreme Vulnerable Driver – A Deep Dive into HEVD Exploitation

2 years ago

The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills…

OSGINT – A Deep Dive Into GitHub User Information Retrieval

2 years ago

In the vast realm of GitHub, the ability to glean information about users can be invaluable for various purposes. 'OSGINT:…

Rolling Shells – Login to Unprotected Shells Randomly Using SHODAN

2 years ago

What are open shells? An "open shell" is a term often used in cybersecurity to refer to a remote shell…

WcamPhish – Unauthorized Remote Camera Access via Link

2 years ago

Introduction WcamPhish is a method for capturing images of a target's webcam or front camera on a phone. In order…

Shaco – C linux agent for the Havoc framework

2 years ago

Shaco Shaco is a simple C Linux agent for the Havoc framework, available at https://github.com/HavocFramework/Havoc. Utilizing a hardcoded socket, Shaco…

Impulse Denial-of-service ToolKit

2 years ago

Modern Denial-of-service ToolKit Main Window Impulse Methods-  MethodTargetDescriptionSMSPHONESends a massive amount of SMS messages and calls to a single targetEMAILEMAILSends…

Denial of Service with Bark

2 years ago

Bark Toolkit About  Bark Toolkit is a set of tools that provide denial-of-service attacks. Bark Toolkit includes an SMS attack…

Exploring the Inextricable Link Between Digital Forensics and Cybersecurity

2 years ago

Cybercrime grows in scope and complexity as technology becomes more widely used worldwide. Businesses are being targeted by cybercriminals more…