TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…
This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…
Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students…
DriverJack is a tool designed to load a vulnerable driver by abusing lesser-known NTFS techniques. These method bypass the registration of…
SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…
In the ever-evolving landscape of cybersecurity, DEFCON 32 unveiled pioneering tools that challenge traditional security paradigms. The "ShimMe" talk introduced…
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…
Project Apeman is an advanced tool for security professionals, designed to streamline the analysis of AWS environments using a graph-based…
Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis…
The 2024-PocLib project serves as a crucial resource for cybersecurity enthusiasts and researchers, offering a detailed compilation of the latest…