Scripts to run within Ghidra, maintained by the Trellix ARC team. Ghidra, the open-source software reverse engineering tool, is known…
This is PoC for arbitrary directory creation bug in Container Manager service. This PoC is not thoroughly tested so it…
Stand up a 100% containerized Elastic stack, TLS secured, with Elasticsearch, Kibana, Fleet, and the Detection Engine all pre-configured, enabled…
In the realm of cybersecurity, understanding the vulnerabilities within operating systems is paramount. "Coerced Potato" delves into the intricate world…
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and…
In the realm of cybersecurity and network reconnaissance, RustHound emerges as a versatile hero. This cross-platform BloodHound collector tool, built…
Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# / .NET…
Introduction The majority of WPA2-PSK and WEP encryption attacks can be carried out using the WificraK tool. Using crunch or…
Amazon Relational Database Service (RDS) for MySQL is a fully managed relational database service that provides cost-efficient and resizable capacity,…
Welcome to the 'Guide-CEH-Practical-Master', your essential roadmap to mastering the Certified Ethical Hacker (Practical) exam. Dive deep into the tools,…