Tamil S

Top 3 Cybersecurity Trends for SME Business Leaders in 2024

As Cynet’s COO, my team and I get to work closely with risk management executives at small-to-medium enterprises (SMEs) around…

11 months ago

B(l)utter: A Tool for Reverse Engineering Flutter Mobile Applications

Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only).…

11 months ago

BestEDROfTheMarket: A User-Mode EDR Evasion Lab for Learning and Testing

Little AV/EDR Evasion Lab for training & learning purposes. (????️ under construction..)​ ____ _ _____ ____ ____ ___ __ _____ _…

11 months ago

GitAlerts: Enhancing GitHub Security and Monitoring for Organization Repositories

GitHub has become an important tool for version control and project management in the ever-changing world of software development and…

11 months ago

CVE-2023-6553 Exploit V2

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7…

11 months ago

ICSpector: Microsoft’s Open-Source ICS Forensics Framework

Microsoft ICS Forensics Tools framework is an open-source forensics framework that enables the analysis of Industrial PLC metadata and project…

11 months ago

Atlassian Companion RCE Vulnerability Proof of Concept (CVE-2023-22524)

Atlassian Companion for macOS has a serious remote code execution vulnerability that was just found. It is called CVE-2023-22524. This…

11 months ago

ADOKit: Azure DevOps Services Attack Toolkit

Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by…

11 months ago

CreateToken: Exploiting ZwCreateToken() for SYSTEM Token

In the realm of cybersecurity, understanding and exploiting Windows APIs is pivotal for both defenders and attackers. In this article,…

11 months ago

LDAP Nom Nom: Insane-Speed Active Directory User Enumeration via LDAP Ping Exploitation

With the help of LDAP Ping requests (cLDAP), "LDAP Nom Nom" is a powerful tool that quickly and quietly brute-forces…

11 months ago