GhostRecon – An In-depth Guide To A Compact OSINT Tool For Linux

1 year ago

In the vast world of Linux tools, GhostRecon stands out as a streamlined solution for research and OSINT (Open Source…

LatLoader – Evading Elastic EDR In Lateral Movement

1 year ago

LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this…

Telegram Explorer (TEx) – The Ultimate Toolkit for Telegram Data Analysis

1 year ago

TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the…

HackSys Extreme Vulnerable Driver – A Deep Dive into HEVD Exploitation

1 year ago

The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills…

OSGINT – A Deep Dive Into GitHub User Information Retrieval

1 year ago

In the vast realm of GitHub, the ability to glean information about users can be invaluable for various purposes. 'OSGINT:…

WcamPhish – Unauthorized Remote Camera Access via Link

1 year ago

Introduction WcamPhish is a method for capturing images of a target's webcam or front camera on a phone. In order…

Shaco – C linux agent for the Havoc framework

1 year ago

Shaco Shaco is a simple C Linux agent for the Havoc framework, available at https://github.com/HavocFramework/Havoc. Utilizing a hardcoded socket, Shaco…

TRY HARDER: A Cybersecurity Retro Game for OSCP Preparation

1 year ago

Table of Contents Introduction Objective Features Installation How to Play Game Mechanics Mission Contents Contribution License Credits Introduction "Try Harder"…

Impulse Denial-of-service ToolKit

1 year ago

Modern Denial-of-service ToolKit Main Window Impulse Methods-  MethodTargetDescriptionSMSPHONESends a massive amount of SMS messages and calls to a single targetEMAILEMAILSends…

Exploring the Inextricable Link Between Digital Forensics and Cybersecurity

1 year ago

Cybercrime grows in scope and complexity as technology becomes more widely used worldwide. Businesses are being targeted by cybercriminals more…