Enhancing Proposal Management Proposal management can be a complex task. Companies across all industries face various challenges when managing the…
Awesome VirusTotal Enterprise Search Queries (formerly Virustotal Intelligence or VTI). In today's evolving cyber landscape, effective threat hunting is paramount.…
The innovative solution designed to streamline your search processes in cloud storage. By bypassing traditional log indexing in SIEMs, CloudGrep…
ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT. Its goal…
In the dynamic realm of cybersecurity, vulnerabilities emerge and evolve constantly. The recent discovery of CVE-2023-43770 highlights an alarming Cross-Site…
In the rapidly evolving landscape of Linux systems, vulnerabilities can emerge that challenge even seasoned developers. 'Building and Configuring: Kernel…
Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent, created by @1N73LL1G3NC3. It was developed as Proof of Concept (POC), that…
In the intricate realm of cyber threats, GootLoader emerges as a formidable challenge. This article delves deep into the intricacies…
The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol…
ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform…