LinikatzV2 – Unveiling UNIX Secrets in Active Directory Environments

1 year ago

LinikatzV2 is a bash script based on the Linikatz tool developed by time-machine (link). It allows post-exploitation tasks on UNIX…

How To Use a Box Plot To Analyze Data

1 year ago

The vast field of data visualization is adorned by many intriguing elements and techniques that help in representing abstract, complex…

CVE-2023-22515 Scanner – Detecting Atlassian Confluence Vulnerability

1 year ago

This is simple scanner for CVE-2023-22515, a critical vulnerability in Atlassian Confluence Data Center and Server that is actively being exploited…

Msprobe – On-Prem Microsoft Solutions Discovery For Security

1 year ago

Discovering and securing on-premises Microsoft solutions is paramount in today's cybersecurity landscape. In this article, we delve into 'msprobe,' a…

Aftermath – Swift-Powered Incident Response And Data Analysis

1 year ago

Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently…

Dangerzone – Safely Convert Risky Documents Into Secure PDFs

1 year ago

Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF. Dangerzone works like this: You…

Nord Stream – Uncovering Secrets With A CICD Exploitation Toolkit

1 year ago

Nord Stream is a tool that allows you extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently supports Azure…

Ghidra Script Mastery – Managing And Automating With GhidraScripts For Golang

1 year ago

Scripts to run within Ghidra, maintained by the Trellix ARC team. Ghidra, the open-source software reverse engineering tool, is known…

CVE-2023-36723 – Windows Sandbox Directory Creation Vulnerability

1 year ago

This is PoC for arbitrary directory creation bug in Container Manager service. This PoC is not thoroughly tested so it…

The Elastic Container Project – Streamlining Security Research With A Quick Setup Guide

1 year ago

Stand up a 100% containerized Elastic stack, TLS secured, with Elasticsearch, Kibana, Fleet, and the Detection Engine all pre-configured, enabled…