Pwnat : Bridging NAT Barriers Without Port Forwarding

3 months ago

pwnat, by Samy Kamkar, is a tool that allows any client behind a NAT to communicate with a server behind…

CLI Usage : Command-Line Mastery With The BlueKit Toolkit

3 months ago

Explore the comprehensive command-line interface (CLI) of the BlueKit toolkit designed for cybersecurity professionals. This article delves into the various…

apkInspector – A Comprehensive Tool For APK Analysis And Evasion Detection

3 months ago

apkInspector is a tool designed to provide detailed insights into the zip structure of APK files, offering the capability to…

WinRM Client Certificate Authentication : Step-By-Step Setup And Configuration Guide

3 months ago

This repo demonstrates how to create certificates for WinRM/WSMan client certificate authentication and how to configure Windows to setup the…

MSC Dropper – A Python Tool For Custom MSC File Creation And Payload Execution

3 months ago

MSC Dropper is a Python script designed to automate the creation of MSC (Microsoft Management Console) files with customizable payloads…

Atexec-Pro : Advanced Features And Usage For Remote Command Execution

3 months ago

Modified based on atexec.py. The TSCH service is used by default(need port 135 a dynamic high port), port 445 is no…

Project Horus – The Comprehensive Toolkit For Investigation Assistance

3 months ago

Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages advanced APIs and data compilation…

CVE-2024-29824 : Exploring The Remote Code Execution Vulnerability In Ivanti EPM

3 months ago

In recent developments, a significant security vulnerability has emerged within Ivanti Endpoint Manager (EPM), identified as CVE-2024-29824. This critical flaw…

Awesome Web Hacking – A Comprehensive Guide To Tools, Techniques, And Resources

3 months ago

This list is for anyone wishing to learn about web application security but do not have a starting point. You…

Security Ninjas AppSec Training – Your Complete Guide To Mastering Application Security

3 months ago

This hands-on training lab consists of 10 fun real world like hacking exercises, corresponding to each of the OWASP Top…