Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

10 months ago

Embark on the journey of becoming a certified Red Team professional with our definitive guide. This article provides a comprehensive…

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

10 months ago

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within the Chromium web browser which…

Rust BOFs – Unlocking New Potentials In Cobalt Strike

10 months ago

This took me like 4 days (+2 days for an update), but I got it working... rust core + alloc…

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

10 months ago

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is a 100% custom-built C# LDAP…

Cloudkicker – Implementing Basic Authentication ith .htaccess And htpasswd

10 months ago

There are a number of excellent tutorials. I recommend this one: Basically, you are going to create a .htaccess file…

Pwnlook – A Deep Dive Into Outlook Email Exploitation

10 months ago

Pwnlook is an offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to…

EDRenum-BOF : Compiling Insights On Endpoint Detection And Response

10 months ago

In the evolving landscape of cybersecurity, understanding and mitigating threats through advanced tools is paramount. "EDRenum-BOF" emerges as a critical…

Penelope – A Versatile Shell Handler For Exploiting RCE Vulnerabilities

10 months ago

Penelope is a shell handler designed to be easy to use and intended to replace netcat when exploiting RCE vulnerabilities.…

Vulnhuntr – Unleashing LLMs For Advanced Security Vulnerability Detection In Codebases

10 months ago

Vulnhuntr leverages the power of LLMs to automatically create and analyze entire code call chains starting from remote user input…

LsassReflectDumping – A Deep Dive Into Secure Credential Extraction Techniques

10 months ago

This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is…