Nosferatu : Lsass NTLM Authentication Backdoor

3 years ago

Nosferatu is a Lsass NTLM Authentication Backdoor How It Works First, the DLL is injected into the lsass.exe process, and will begin…

Kubernetes-Goat : Is A “Vulnerable By Design” Kubernetes Cluster

3 years ago

Kubernetes-Goat is designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security. Setting Up Kubernetes Goat…

Facebook Messenger Hack: Which One to Choose and How to Go About It?

3 years ago

Facebook is already an essential part of our lives as it has become the center of our casual discussions, socializing,…

Cybersecurity for Students

3 years ago

With technology being such a huge part of student life, it's alarming how many students ignore or don't pay attention…

Kube-Applier : Enables Automated Deployment And Declarative Configuration For Your Kubernetes Cluster

3 years ago

Kube-Applier is a service that enables continuous deployment of Kubernetes objects by applying declarative configuration files from a Git repository…

Covery: Online Fraud Detection Software

3 years ago

Every business owner thinks about how to ensure a safety for own finances, confidential documents, workers’ and clients’ personal data…

JVMXRay : Make Java Security Events Of Interest Visible For Analysis

3 years ago

JVMXRay is a technology for monitoring access to Java protected system resources like files, sockets, and more, used by your…

Hyenae Ng : An Advanced Cross-Platform Network Packet Generator And The Successor Of Hyenae

3 years ago

Hyenae Ng (Next Generation) is a re-write of the original Hyenae tool which was originally published back in the year…

Gotanda : Browser Web Extension For OSINT

3 years ago

Gotanda is OSINT(Open Source Intelligence) Web Extension for Firefox/Chrome. This Web Extension could search OSINT information from some IOC in…

Fhex : A Full-Featured HexEditor

3 years ago

Fhex is born with the aim to develop a lightweight, but useful tool. The reason is that the existing hex…