Embark on a journey to become a Web3 security expert with our comprehensive 2024 roadmap. This guide delves deep into…
This extension hijacks Burp's HTTP and TLS stack, allowing you to spoof any browser TLS fingerprint (JA3). It boosts the…
SMBclient-ng is a robust and intuitive command-line tool designed to enhance interactions with SMB shares, offering a plethora of commands…
MemFiles is a toolkit for CobaltStrike that enables Operators to write files produced by the Beacon process into memory, rather…
This Python script generates interpreted code which creates the supplied ELF as a file in memory and executes it (without…
This repository contains a collection of tools and resources for penetration testing and security research. This repository is intended solely…
Welcome to the Red Team Interview Questions repository! This repository aims to provide a comprehensive list of topics and questions…
POC for CVE-2024-36401: RCE for GeoServer version prior to 2.25.1, 2.24.3 and 2.23.5 of GeoServer. This POC is based on…
Researchers delve into the vulnerabilities inherent in Intel's branch prediction algorithms. Highlighting novel control-flow attacks, the study showcases techniques that…
vArmor is a cloud-native container sandbox system. It leverages Linux's AppArmor LSM, BPF LSM and Seccomp technologies to implement enforcers. It can be used to…