Learn Rust, One Exercise At A Time

2 years ago

You've heard about Rust, but you never had the chance to try it out?This course is for you! You'll learn…

Prince Ransomware – A New Threat In Cybersecurity

2 years ago

Prince now has a Windows Defender flag, namely "Ransom:Win64/PrinceRansom.YAA!MTB". This means that Prince Ransomware will no longer bypass Windows Defender…

reCAPTCHA Phish – A Dive Into Social Engineering Tactics

2 years ago

This is small harness to recreate the social engineering and phishing lure recently seen in the wild around August/September 2024.…

Process Injection Techniques – For Advanced Adversary Emulation

2 years ago

Usman Sikander (a.k.a Offensive-Panda) is a seasoned security professional specializing in adversary emulation, malware development, malware analysis, and red teaming.…

Hill Saturday Malware Analysis : Open Dir -> Obfuscated Python -> DONUT Launcher -> XWorm

2 years ago

Just some quick malware analysis on a free Saturday. I was just chilling in the morning, reading twitter, and this…

MyMSIAnalyzer – A Comprehensive Tool For Detecting MSI File Vulnerabilities And Privilege Escalation

2 years ago

MyMSIAnalyzer is a tool that allows you to detect vulnerabilities inside MSI files. It is able to: Check for credential…

Artemis – A Modular Vulnerability Scanner For Enhanced Website Security

2 years ago

Artemis is a modular vulnerability scanner. It's the tool that powers CERT PL scanning activities by checking various aspects of…

MSI Analyzer – Analyzing Windows Installer Files For Vulnerabilities

2 years ago

This Python script for Linux can analyze Microsoft Windows *.msi Installer files and point out potential vulnerabilites. It was developed…

BEAR-C2 : Simulated Command And Control Framework For APT Attack Research

2 years ago

Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear…

Bearer – A Quick Guide To Scanning And Securing Your Application

2 years ago

Discover your application security risks and vulnerabilities in only a few minutes. In this guide you will install Bearer CLI,…