Remote Lua Loader : Mastering PS4 And PS5 Exploits With Advanced Scripting

2 weeks ago

The Remote Lua Loader is a tool designed to exploit vulnerabilities in games built with the Artemis game engine, which…

Squid : A RISC-V Emulator For Vulnerability Research

2 weeks ago

Squid is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT) compilation instead of…

ACEshark : A Utility For Windows Service Configuration Analysis

2 weeks ago

ACEshark is a powerful tool designed for rapid extraction and analysis of Windows service configurations and Access Control Entries (ACEs).…

Promptfoo : Enhancing LLM Application Development

2 weeks ago

Promptfoo is an innovative, developer-friendly tool designed to streamline the development and testing of Large Language Model (LLM) applications. It…

Android App Reverse Engineering 101 : Tools And Functions

2 weeks ago

Android App Reverse Engineering 101 is a comprehensive workshop designed to introduce learners to the fundamentals of reverse engineering Android…

MalDoc In PDF : A Novel Technique For Evading Detection

2 weeks ago

The cybersecurity community has recently been alerted to a sophisticated attack method known as "MalDoc in PDF," which involves embedding…

Playstation 4 Save Mounter 1.3 : A Tool For Managing PS4 Saves

2 weeks ago

The Playstation 4 Save Mounter 1.3 is a utility designed to manage save data on the PS4, allowing users to…

Ingram : A Network Camera Vulnerability Scanning Tool

2 weeks ago

Ingram is a powerful tool designed to scan for vulnerabilities in network cameras, supporting devices from major brands like Hikvision,…

CVE-2025-24071_PoC : A Tool For Demonstrating NTLM Hash Leak Vulnerability

2 weeks ago

CVE-2025-24071 is a critical vulnerability in Microsoft Windows File Explorer that allows attackers to capture NTLM hashed passwords without user…

FuzzLists : The Ultimate Toolkit For Penetration Testing And Bug Hunting

2 weeks ago

FuzzLists is a comprehensive collection of lists designed to aid in penetration testing and bug bounty hunting. These lists include…