ChopChop – Web Security Testing Tool

1 year ago

ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT. Its goal…

CVE-2023-43770 POC – Unveiling XSS Vulnerability In Roundcube

1 year ago

In the dynamic realm of cybersecurity, vulnerabilities emerge and evolve constantly. The recent discovery of CVE-2023-43770 highlights an alarming Cross-Site…

Building And Configuring – Kernel Exploits On Ubuntu 23.04

1 year ago

In the rapidly evolving landscape of Linux systems, vulnerabilities can emerge that challenge even seasoned developers. 'Building and Configuring: Kernel…

Nightmangle – Cyber Espionage via Telegram’s C2 Agent ExploredNightmangle

1 year ago

Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent, created by @1N73LL1G3NC3. It was developed as Proof of Concept (POC), that…

Script Overview – Decoding GootLoader Payloads And Obfuscations

1 year ago

In the intricate realm of cyber threats, GootLoader emerges as a formidable challenge. This article delves deep into the intricacies…

Wireshark 4.0.10 Released – What’s New!

1 year ago

The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol…

ELFEN – Linux Malware Analysis Sandbox

1 year ago

ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform…

Incident Response Playbooks – Streamlined Security Mitigation Guides

1 year ago

Welcome to the Incident Response Playbooks repository! We're creating these playbooks with the knowledge gained from LetsDefend to assist security experts in…

HyperDbg v0.6-beta: Advanced Debugging & Memory Upgrades

1 year ago

If you’re enjoying HyperDbg, don’t forget to give a star on GitHub! Please visit Build & Install to configure the environment for…

Awesome Command And Control

1 year ago

A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd…