v6.4.1 – Essential Security Patch For dnSpyEx To Thwart Arbitrary Code Execution Threat

1 year ago

In a decisive move to fortify software security, ElektroKill announced the release of dnSpyEx v6.4.1 on September 8, 2023. This…

Todesstern – The Advanced Mutator Engine For Injection Vulnerability Discovery

1 year ago

Todesstern (in english: Death Star) is a simple mutator engine which focuses on finding unknown classes of injection vulnerabilities. The…

msdocviewer – Streamlining Win32 API And Driver Documentation Viewing – A Comprehensive Guide

1 year ago

msdocviewer is a simple tool for viewing Microsoft's win32 API and driver technical documentation. msdocviewer consists of two parts. The first is…

GTPDOOR Scan – The Multithreaded Tool For Detecting GTPDOOR Malware Infections

1 year ago

A multithreaded network scanner to scan for hosts infected with the GTPDOOR malware. Technical writeup here. Three detection methods supported: ACK…

v3.2.0 – Transforming Security Protocols With Fuzzing, LDAP Enhancements, And Robust Fixes

1 year ago

In the latest iteration of our cutting-edge software, v3.2.0 emerges as a significant leap forward, embodying the relentless pursuit of…

Awesome Web Security – The Ultimate Guide To Mastering Techniques, Tools, And Resources

1 year ago

Needless to say, most websites suffer from various types of bugs which may eventually lead to vulnerabilities. Why would this…

CVE-2024-2432 Palo Alto GlobalProtect EoP : Unveiling The Path To Privilege Escalation

1 year ago

On Windows system, it was found that GlobalProtect (App version 6.1.1-5 and 6.2.0-89) was vulnerable to arbitrary file delete with…

Awesome-OpSec : Empowering Digital Safety Through Feminist Cybersecurity And Operational Security

1 year ago

A Feminist Guide to Digital Defense serves as a comprehensive resource for enhancing online safety and privacy through a feminist…

CVE-2024-25153 : A Detailed Guide To Remote Code Execution In Fortra File Catalyst Workflow

1 year ago

This is a proof of concept for CVE-2024-25153, a Remote Code Execution vulnerability in Fortra FileCatalyst Workflow 5.x, before 5.1.6…

Kimsuky PowerShell Backdoor – A Comprehensive Analysis Of Its Commands And Operations

1 year ago

In the shadowy realms of cyber espionage, the Kimsuky PowerShell Backdoor stands as a sophisticated tool designed for stealthy infiltrations…