Microsoft-Analyzer-Suite (Community Edition) : A Deep Dive Into Analyzing Microsoft 365 Security

8 months ago

Explore the capabilities of the Microsoft-Analyzer-Suite (Community Edition), a powerful collection of PowerShell scripts designed to enhance your security analysis.…

Cloud_Enum – Advancing Cloud Security Through Multi-Cloud OSINT Tools

8 months ago

I built this tool in 2019 for a pentest involving Azure, as no other enumeration tools supported it at the…

EDRPrison – Advanced Evasion Techniques Using Legitimate WFP Drivers

8 months ago

EDRPrison leverages a legitimate WFP callout driver, WinDivert, to effectively silence EDR systems. Drawing inspiration from tools like Shutter, FireBlock, and EDRSilencer, this project…

Using Hardware -Based Exploits : A Comprehensive Guide To Braktooth, Internalblue, And Automated Techniques

8 months ago

You need to buy the following hardware to be able to run the exploits: The installation is partially automated in…

Manual Exploits – Assessing Device Security Through Direct Interaction

8 months ago

This check could be used to assess the severity of the attacks. If the target device is pairable even if…

Workflow – Comprehensive Guide To Using BlueToolkit For Bluetooth Vulnerability Testing

8 months ago

The toolkit has several ways it could be used, due to its modular nature, but the main feature of it…

Awesome Red Teaming – A Comprehensive Guide To Advanced Security Techniques

8 months ago

Explore the dynamic world of red teaming with our extensive guide designed for cybersecurity professionals and enthusiasts alike. 'Awesome Red…

Awesome OSINT – A Comprehensive Resource For Cybersecurity Experts

8 months ago

A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources.…

Pwnat : Bridging NAT Barriers Without Port Forwarding

8 months ago

pwnat, by Samy Kamkar, is a tool that allows any client behind a NAT to communicate with a server behind…

CLI Usage : Command-Line Mastery With The BlueKit Toolkit

8 months ago

Explore the comprehensive command-line interface (CLI) of the BlueKit toolkit designed for cybersecurity professionals. This article delves into the various…