LLVM-YX-Callobfuscator : Enhancing Windows x64 Native Call Security At Compile Time

10 months ago

A powerful LLVM plugin designed to bolster the security of Windows x64 native calls during the compilation process. This innovative…

v6.5.0 : dnSpy Version 6.5.0 – New Features, Improvements, And Bug Fixes

10 months ago

In this update, dnSpy introduces a host of new features, enhancements, and bug fixes, making it a more powerful and…

MobSF Remote Code Execution (CVE-2024-21633) – Uncovering Vulnerabilities In Mobile Security Framework

10 months ago

I have found an arbitrary file write in apktool and reported via github security advisory. I was aware that many projects…

Watchman – Your Malware Alert Bot with Notion, Slack, And BetterUptime Integration

10 months ago

The vigilant configuration change alerting and incident escalation bot designed to safeguard your digital world. In this article, we'll explore…

pphack : The Advanced Client-Side Prototype Pollution Scanner

10 months ago

The cutting-edge Client-Side Prototype Pollution Scanner. In this article, we'll delve into the installation process, usage, and features of pphack,…

BugBlaze : Your All-In-One Cybersecurity Toolkit

10 months ago

In the world of cybersecurity, staying ahead of potential threats is essential. BugBlaze is a powerful toolkit that simplifies the…

Use The Model To Predict – A Comprehensive Guide To Predictive Modeling And Retraining Ith Python

10 months ago

In the realm of data science and machine learning, 'Use the Model to Predict' is not just a phrase, but…

Active Directory Exploitation Cheat Sheet – A Comprehensive Guide To Enumeration And Attack Methods

10 months ago

This cheat sheet contains common enumeration and attack methods for Windows Active Directory. This cheat sheet is inspired by the PayloadAllTheThings repo.…

Frameless BITB – A New Approach To Phishing Attacks

10 months ago

A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters…

Chista | Open Source Threat Intelligence Framework – Understanding, Predicting, And Defending Against Cyber Threats

10 months ago

In the ever-evolving landscape of cybersecurity threats, staying one step ahead of malicious actors is crucial. Introducing Chista, an open-source…