Kimsuky PowerShell Backdoor – A Comprehensive Analysis Of Its Commands And Operations

11 months ago

In the shadowy realms of cyber espionage, the Kimsuky PowerShell Backdoor stands as a sophisticated tool designed for stealthy infiltrations…

SpoofCheck – Fortifying Email Defenses By Unmasking Domain Spoofability

11 months ago

A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak…

Awesome Incident Response – Essential Tools And Resources

11 months ago

Digital Forensics and Incident Response (DFIR) teams are groups of people in an organization responsible for managing the response to…

Ansible Role : Bloodhound-CE (Ludus) – A Quick Deployment Guide

11 months ago

An Ansible Role that installs Bloodhound-CE on a debian based system. Checks if {{ ludus_bloodhound_ce_install_path }}/docker-compose.yml exists If not, it installs vanilla…

DetectDee – The Ultimate Guide To Tracing Social Media Profiles

11 months ago

DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing…

Awesome Honeypots : Guardians Of The Digital Frontier – A Comprehensive Guide To Cybersecurity Tools

11 months ago

A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and…

Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques

11 months ago

Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is…

Mali GPU Kernel LPE – Unveiling Root Access Exploits In Google Pixel Devices

11 months ago

This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox,…

v2.3.0 – Enhanced Runtime Display And Custom Configurations In Naabu

11 months ago

In the latest software evolution, version 2.3.0 marks a significant milestone for Naabu, introducing key enhancements that users have eagerly…

DarkGPT : A Step-By-Step Installation Guide For Interacting With Leaked Databases

11 months ago

DarkGPT unveils the shadowy corners of cyberspace by granting access to leaked databases through a cutting-edge AI powered by GPT-4-200K.…