B(l)utter: A Tool for Reverse Engineering Flutter Mobile Applications

1 year ago

Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only).…

BestEDROfTheMarket: A User-Mode EDR Evasion Lab for Learning and Testing

1 year ago

Little AV/EDR Evasion Lab for training & learning purposes. (????️ under construction..)​ ____ _ _____ ____ ____ ___ __ _____ _…

GitAlerts: Enhancing GitHub Security and Monitoring for Organization Repositories

1 year ago

GitHub has become an important tool for version control and project management in the ever-changing world of software development and…

CVE-2023-6553 Exploit V2

1 year ago

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7…

ICSpector: Microsoft’s Open-Source ICS Forensics Framework

1 year ago

Microsoft ICS Forensics Tools framework is an open-source forensics framework that enables the analysis of Industrial PLC metadata and project…

Atlassian Companion RCE Vulnerability Proof of Concept (CVE-2023-22524)

1 year ago

Atlassian Companion for macOS has a serious remote code execution vulnerability that was just found. It is called CVE-2023-22524. This…

ADOKit: Azure DevOps Services Attack Toolkit

1 year ago

Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by…

CreateToken: Exploiting ZwCreateToken() for SYSTEM Token

1 year ago

In the realm of cybersecurity, understanding and exploiting Windows APIs is pivotal for both defenders and attackers. In this article,…

LDAP Nom Nom: Insane-Speed Active Directory User Enumeration via LDAP Ping Exploitation

1 year ago

With the help of LDAP Ping requests (cLDAP), "LDAP Nom Nom" is a powerful tool that quickly and quietly brute-forces…

Mastering YARA: A Comprehensive Guide to Detection Engineering and Rule Development

1 year ago

Threat identification and analysis are very important for keeping systems and networks safe in the ever-changing world of cybersecurity. YARA…