In this comprehensive exploration, we delve into the intricate world of Hyper-V, showcasing a collection of significant work and research…
Cybersecurity blue teams are groups of individuals who identify security flaws in information technology systems, verify the effectiveness of security measures,…
In a decisive move to fortify software security, ElektroKill announced the release of dnSpyEx v6.4.1 on September 8, 2023. This…
Todesstern (in english: Death Star) is a simple mutator engine which focuses on finding unknown classes of injection vulnerabilities. The…
msdocviewer is a simple tool for viewing Microsoft's win32 API and driver technical documentation. msdocviewer consists of two parts. The first is…
A multithreaded network scanner to scan for hosts infected with the GTPDOOR malware. Technical writeup here. Three detection methods supported: ACK…
In the latest iteration of our cutting-edge software, v3.2.0 emerges as a significant leap forward, embodying the relentless pursuit of…
Needless to say, most websites suffer from various types of bugs which may eventually lead to vulnerabilities. Why would this…
On Windows system, it was found that GlobalProtect (App version 6.1.1-5 and 6.2.0-89) was vulnerable to arbitrary file delete with…
A Feminist Guide to Digital Defense serves as a comprehensive resource for enhancing online safety and privacy through a feminist…