From Alan Turing to Harvard Computer Science: How Programming Has ChangedFrom Alan Turing to Harvard Computer Science: How Programming Has Changed

From Alan Turing to Harvard Computer Science: How Programming Has Changed

4 years ago

Alan Turing’s story about programming is cited by many people because it depicts how the gay community is stigmatized. His…

How your web design can impact your content marketing?How your web design can impact your content marketing?

How your web design can impact your content marketing?

4 years ago

How your web design can impact your content marketing? The web design that a brand uses has a great impact…

UnhookMe : An Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your Red Teams MalwareUnhookMe : An Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your Red Teams Malware

UnhookMe : An Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your Red Teams Malware

4 years ago

UnhookMe is a Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your…

Sigurlfind3R : A Reconnaissance Tool To Fetch URLs From AlienVault’s OTXSigurlfind3R : A Reconnaissance Tool To Fetch URLs From AlienVault’s OTX

Sigurlfind3R : A Reconnaissance Tool To Fetch URLs From AlienVault’s OTX

4 years ago

Sigurlfind3R is a passive reconnaissance tool, it fetches known URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine. Usage sigurlfind3r -h This will…

ADCSPwn : A Tool To Escalate Privileges In An Active Directory Network By Coercing Authenticate From Machine Accounts And Relaying To The Certificate ServiceADCSPwn : A Tool To Escalate Privileges In An Active Directory Network By Coercing Authenticate From Machine Accounts And Relaying To The Certificate Service

ADCSPwn : A Tool To Escalate Privileges In An Active Directory Network By Coercing Authenticate From Machine Accounts And Relaying To The Certificate Service

4 years ago

ADCSPwn is a tool to escalate privileges in an active directory network by coercing authenticate from machine accounts (Petitpotam) and…

Php-Jpeg-Injector : Injects Php Payloads Into Jpeg ImagesPhp-Jpeg-Injector : Injects Php Payloads Into Jpeg Images

Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images

4 years ago

Php-Jpeg-Injector Injects php payloads into jpeg images. Related to this post. Exploiting PHP-GD Image Create From jpeg() Function Proof-of-concept to exploit…

Solitude : A Privacy Analysis Tool That Enables Anyone To Conduct Their Own Privacy InvestigationsSolitude : A Privacy Analysis Tool That Enables Anyone To Conduct Their Own Privacy Investigations

Solitude : A Privacy Analysis Tool That Enables Anyone To Conduct Their Own Privacy Investigations

4 years ago

Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or…

XDR and the Cloud Security ArchitectureXDR and the Cloud Security Architecture

XDR and the Cloud Security Architecture

4 years ago

Cloud security raises significant challenges for organizations, as more workloads and mission critical applications move to the cloud. XDR is…

Go-Shellcode : A Repository Of Windows Shellcode Runners And Supporting UtilitiesGo-Shellcode : A Repository Of Windows Shellcode Runners And Supporting Utilities

Go-Shellcode : A Repository Of Windows Shellcode Runners And Supporting Utilities

4 years ago

Go-Shellcode is a repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls…

CThreadHijack : Beacon Object File (BOF) For Remote Process Injection Via Thread HijackingCThreadHijack : Beacon Object File (BOF) For Remote Process Injection Via Thread Hijacking

CThreadHijack : Beacon Object File (BOF) For Remote Process Injection Via Thread Hijacking

4 years ago

cThreadHijack is a Beacon Object File (BOF) for remote process injection, via thread hijacking, without spawning a remote thread. Accompanying…