Ansible Role : Bloodhound-CE (Ludus) – A Quick Deployment Guide

8 months ago

An Ansible Role that installs Bloodhound-CE on a debian based system. Checks if {{ ludus_bloodhound_ce_install_path }}/docker-compose.yml exists If not, it installs vanilla…

DetectDee – The Ultimate Guide To Tracing Social Media Profiles

8 months ago

DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing…

Awesome Honeypots : Guardians Of The Digital Frontier – A Comprehensive Guide To Cybersecurity Tools

8 months ago

A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and…

Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques

8 months ago

Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is…

Mali GPU Kernel LPE – Unveiling Root Access Exploits In Google Pixel Devices

8 months ago

This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox,…

v2.3.0 – Enhanced Runtime Display And Custom Configurations In Naabu

8 months ago

In the latest software evolution, version 2.3.0 marks a significant milestone for Naabu, introducing key enhancements that users have eagerly…

DarkGPT : A Step-By-Step Installation Guide For Interacting With Leaked Databases

8 months ago

DarkGPT unveils the shadowy corners of cyberspace by granting access to leaked databases through a cutting-edge AI powered by GPT-4-200K.…

Awesome Hacking – An Amazing Project : The Ultimate Resource Guide For Cybersecurity Exploration

9 months ago

A curated list of awesome Hacking. Inspired by awesome-machine-learning If you want to contribute to this list (please do), send me…

The Spy’s Job – Mastering OSINT With XDeadHackerX’s Comprehensive Toolkit

9 months ago

Buenas, soy XDeadHackerX y quiero presentaros mi nueva herramienta llamada The_Spy´s_Job.  Esta Tool está enfocado al OSINT de casi todos los ámbitos (Personas, Nicknames, Redes Sociales,…

WinSOS – Harnessing Trusted Binaries For Stealthy DLL Hijacking

9 months ago

WinSOS represents a sophisticated technique that turns the Windows operating system's own features against it. By manipulating executables in the…