Heap Exploitation Training : A Comprehensive Guide From Basics To Advanced Techniques

1 week ago

This article delves into our comprehensive training program designed to teach you the intricacies of exploiting heap vulnerabilities in glibc.…

BloodHound.py : Installation, Usage, And Features

1 week ago

BloodHound.py is a Python based ingestor for BloodHound, based on Impacket. The code in this branch is only compatible with…

100 Days Of Rust 2025 : From Incident Response To Linux System Programming

2 weeks ago

In 2025 I wanted to try something new. In addition to a traditional 100 days of Yara, I will also…

Presenterm : Revolutionizing Terminal-Based Presentations With Markdown

2 weeks ago

presenterm lets you create presentations in markdown format and run them from your terminal, with support for image and animated…

JailbreakEval : Automating the Evaluation Of Language Model Security

2 weeks ago

Jailbreak is an attack that prompts a language model to give actionable responses to harmful behaviors, such as writing an…

HASH : Harnessing HTTP Agnostic Software Honeypots For Enhanced Cybersecurity

2 weeks ago

The main philosophy of HASH is to be easy to configure and flexible to mimic any software running on HTTP/HTTPs.…

SECurityTr8Ker : SEC Cybersecurity Disclosure Monitor

2 weeks ago

SECurityTr8Ker is a Python application designed to monitor the U.S. Securities and Exchange Commission's (SEC) RSS feed for new 8-K…

ripgrep : The Fast, Flexible Search Tool

2 weeks ago

ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will…

InfluxDB : The Open Source Leader In Time Series Data And Real-Time Analytics

2 weeks ago

InfluxDB is the leading open source time series database for metrics, events, and real-time analytics. Project Status This main branch…

Fuxploider : Automating File Upload Vulnerability Exploitation

2 weeks ago

Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws.…