GCPwn – A Comprehensive Tool For GCP Security Testing

1 year ago

gcpwn was a tool built by myself while trying to learn GCP and leverages the newer GRPC client libraries created by google. It consists…

Quick Start – Comprehensive Guide To Installing And Configuring Malcolm On Linux Platforms

1 year ago

The files required to build and run Malcolm are available on its [GitHub page]({{ site.github.repository_url }}/tree/{{ site.github.build_revision }}). Malcolm's source-code…

Installation – Comprehensive Guide To Using Androguard

1 year ago

The versatile capabilities of Androguard, a powerful tool for reverse engineering Android applications. This guide provides a step-by-step overview on…

Netis Cloud Probe – Bridging Network Monitoring Gaps ith Advanced Packet Capture Tools

1 year ago

Netis Cloud Probe (Packet Agent, name used before)is an open source project to deal with such situation: it captures packets…

RdpStrike – Harnessing PIC And Hardware Breakpoints For Credential Extraction

1 year ago

The RdpStrike is basically a mini project I built to dive deep into Positional Independent Code (PIC) referring to a blog post written by C5pider,…

CVE-2024-29849 : The Veeam Backup Enterprise Manager Authentication Bypass

1 year ago

According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have…

CVE-2024-26229 : Address Validation Flaws In IOCTL With METHOD_NEITHER

1 year ago

delve into CVE-2024-26229, a critical security vulnerability identified within the csc.sys driver, pivotal in handling I/O control codes. This issue…

DumpMDEConfig – Extracting Microsoft Defender Configuration And Logs With PowerShell Script

1 year ago

Invoke-DumpMDEConfig is a PowerShell script designed to extract and display Microsoft Defender configuration and logs, including excluded paths, enabled ASR rules,…

Phishing Engagement Infrastructure Setup Guide

1 year ago

The essential steps and strategies for setting up a robust phishing engagement infrastructure. From acquiring and categorizing domains to automating…

Detection Lab – A Comprehensive Overview Of Its Features, Documentation, And Legacy

1 year ago

This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build…