ConfuserEx2 String Decryptor – A Guide To Deobfuscating .NET Applications

11 months ago

ConfuserEx2 is the latest version from the Confuser family → An open-source, free protector for .NET applications. ConfuserEx2_String_Decryptor deobfuscates constants…

GlobalUnProtect – Decrypting And Harvesting Sensitive Data From GlobalProtect Installations

11 months ago

PoC tool for decrypting and collecting GlobalProtect configuration, cookies, and HIP files from windows client installations. Usage Run as standalone…

Capa v7.3.0 – Enhanced Malware Analysis With VMRay Integration, Ghidra Support, And New Capa Rules Website

11 months ago

The v7.3.0 capa release comes with the following three major enhancements: 1. Support For VMRay Sandbox Analysis Archives Unlock powerful…

MSSprinkler – Enhancing M365 Security Through Advanced Password Testing

11 months ago

MSSprinkler is a password spraying utility for organizations to test their M365 accounts from an external perspective. It employs a…

Inception – A Deep Dive Into PCI-Based DMA Memory Hacking

11 months ago

Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard,…

NyxInvoke – A Comprehensive Guide To Advanced Execution Techniques In Rust

11 months ago

NyxInvoke is a versatile Rust-based tool designed for executing .NET assemblies, PowerShell commands/scripts, and Beacon Object Files (BOFs) with built-in…

Learn Rust, One Exercise At A Time

11 months ago

You've heard about Rust, but you never had the chance to try it out?This course is for you! You'll learn…

Prince Ransomware – A New Threat In Cybersecurity

11 months ago

Prince now has a Windows Defender flag, namely "Ransom:Win64/PrinceRansom.YAA!MTB". This means that Prince Ransomware will no longer bypass Windows Defender…

reCAPTCHA Phish – A Dive Into Social Engineering Tactics

11 months ago

This is small harness to recreate the social engineering and phishing lure recently seen in the wild around August/September 2024.…

Process Injection Techniques – For Advanced Adversary Emulation

11 months ago

Usman Sikander (a.k.a Offensive-Panda) is a seasoned security professional specializing in adversary emulation, malware development, malware analysis, and red teaming.…