PS4-PS5-Game-Patch : Revolutionizing Console Gaming With Custom Enhancements

1 year ago

The PS4-PS5-Game-Patch repository is a collection of custom game patches designed for PlayStation 4 and PlayStation 5 games. This repository…

Remote Lua Loader : Mastering PS4 And PS5 Exploits With Advanced Scripting

1 year ago

The Remote Lua Loader is a tool designed to exploit vulnerabilities in games built with the Artemis game engine, which…

Squid : A RISC-V Emulator For Vulnerability Research

1 year ago

Squid is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT) compilation instead of…

ACEshark : A Utility For Windows Service Configuration Analysis

1 year ago

ACEshark is a powerful tool designed for rapid extraction and analysis of Windows service configurations and Access Control Entries (ACEs).…

Promptfoo : Enhancing LLM Application Development

1 year ago

Promptfoo is an innovative, developer-friendly tool designed to streamline the development and testing of Large Language Model (LLM) applications. It…

Android App Reverse Engineering 101 : Tools And Functions

1 year ago

Android App Reverse Engineering 101 is a comprehensive workshop designed to introduce learners to the fundamentals of reverse engineering Android…

MalDoc In PDF : A Novel Technique For Evading Detection

1 year ago

The cybersecurity community has recently been alerted to a sophisticated attack method known as "MalDoc in PDF," which involves embedding…

Playstation 4 Save Mounter 1.3 : A Tool For Managing PS4 Saves

1 year ago

The Playstation 4 Save Mounter 1.3 is a utility designed to manage save data on the PS4, allowing users to…

Ingram : A Network Camera Vulnerability Scanning Tool

1 year ago

Ingram is a powerful tool designed to scan for vulnerabilities in network cameras, supporting devices from major brands like Hikvision,…

CVE-2025-24071_PoC : A Tool For Demonstrating NTLM Hash Leak Vulnerability

1 year ago

CVE-2025-24071 is a critical vulnerability in Microsoft Windows File Explorer that allows attackers to capture NTLM hashed passwords without user…