Checking The Installation – A Guide To Installing And Verifying Tartuf

1 year ago

You can install tartufo in the usual ways you would for a Python Package, or using docker to pull the latest tartufo docker image from Docker…

CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

1 year ago

We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…

Tempest – A Rust Journey Through Command And Control Research

1 year ago

This is a research command and control framework. What I mean by this, is that it is meant for research purposes.…

OSINT Cheat Sheet – Essential Tools And Resources For Digital Investigations

1 year ago

In the rapidly evolving world of digital investigations, staying ahead with the right tools is crucial. This OSINT Cheat Sheet…

Maestro – Revolutionizing Remote Operations With Seamless Azure Integratio

1 year ago

In the evolving landscape of cybersecurity, the ability to conduct sophisticated post-exploitation operations discretely and efficiently is paramount. Enter Maestro,…

CVE-2024-38077 : A Zero-Click RCE Threat In Windows Server 2025

1 year ago

Earlier this year, we conducted an in-depth analysis of the Windows Remote Desktop Services. Multiple vulnerabilities were discovered, and all…

TrickDump – Evading Detection With Advanced Memory Dump Techniques

1 year ago

TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…

Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources

1 year ago

This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…

100 Red Team Projects – A Comprehensive Guide For Pentesters And Network Managers

1 year ago

Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students…

DriverJack – Exploiting NTFS Techniques For Covert Driver Loading

1 year ago

DriverJack is a tool designed to load a vulnerable driver by abusing lesser-known NTFS techniques. These method bypass the registration of…