B(l)utter: A Tool for Reverse Engineering Flutter Mobile Applications

11 months ago

Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only).…

BestEDROfTheMarket: A User-Mode EDR Evasion Lab for Learning and Testing

11 months ago

Little AV/EDR Evasion Lab for training & learning purposes. (????️ under construction..)​ ____ _ _____ ____ ____ ___ __ _____ _…

GitAlerts: Enhancing GitHub Security and Monitoring for Organization Repositories

11 months ago

GitHub has become an important tool for version control and project management in the ever-changing world of software development and…

CVE-2023-6553 Exploit V2

11 months ago

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7…

ICSpector: Microsoft’s Open-Source ICS Forensics Framework

11 months ago

Microsoft ICS Forensics Tools framework is an open-source forensics framework that enables the analysis of Industrial PLC metadata and project…

Atlassian Companion RCE Vulnerability Proof of Concept (CVE-2023-22524)

11 months ago

Atlassian Companion for macOS has a serious remote code execution vulnerability that was just found. It is called CVE-2023-22524. This…

ADOKit: Azure DevOps Services Attack Toolkit

11 months ago

Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by…

CreateToken: Exploiting ZwCreateToken() for SYSTEM Token

11 months ago

In the realm of cybersecurity, understanding and exploiting Windows APIs is pivotal for both defenders and attackers. In this article,…

LDAP Nom Nom: Insane-Speed Active Directory User Enumeration via LDAP Ping Exploitation

11 months ago

With the help of LDAP Ping requests (cLDAP), "LDAP Nom Nom" is a powerful tool that quickly and quietly brute-forces…

Mastering YARA: A Comprehensive Guide to Detection Engineering and Rule Development

11 months ago

Threat identification and analysis are very important for keeping systems and networks safe in the ever-changing world of cybersecurity. YARA…