Xenon : A New Tool In The Mythic Framework

10 months ago

Xenon is a Windows agent designed for the Mythic framework, inspired by tools like Cobalt Strike. It is currently in…

OSCP : Navigating The Essential Toolkit For Penetration Testing

10 months ago

The OSCP (Offensive Security Certified Professional) certification is a highly respected credential in the cybersecurity industry, focusing on hands-on penetration…

Famatech Advanced IP Scanner Or Advanced Port Scanner Usage

10 months ago

Famatech offers two powerful network management tools: Advanced IP Scanner and Advanced Port Scanner. Both tools are designed to enhance…

ELF Loader And PS5-JAR-Loader : Tools For Enhanced Functionality

10 months ago

In the realm of PlayStation 5 (PS5) development, two significant tools have emerged to enhance the console's capabilities: the ELF…

C2IntelFeeds: Real-Time C2 Infrastructure Tracking for Threat Intelligence

10 months ago

What is C2IntelFeeds? C2IntelFeeds is an open-source intelligence project that provides real-time Command and Control (C2) infrastructure data. Using data…

goLAPS : The Ultimate Guide To Managing LAPS Passwords with Golang

10 months ago

goLAPS is a tool designed to interact with the Local Administrator Password Solution (LAPS) in a domain environment. It allows…

200-OK-Modifier : Mastering Web Application Analysis And Penetration Testing

10 months ago

The 200-OK-Modifier is a versatile Burp extension that allows users to modify server response codes in real-time, specifically changing them…

NullGate : Advancing Evasion Techniques In Windows Exploitation

10 months ago

NullGate is a sophisticated project designed to leverage NTAPI functions using indirect syscalls, incorporating the FreshyCalls method with a novel…

WebHunt : A Dive Into Web App Testing For Bug Bounty Hunting

10 months ago

WebHunt is an innovative project that focuses on web application testing, particularly for bug bounty hunting. It leverages powerful tools…

Process Ghosting In Rust : Crafting Evasive Applications On Windows

10 months ago

Process ghosting is a sophisticated technique used to evade detection by security tools on Windows systems. It involves creating a…