bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor for an Software Bill of…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local Privilege Escalation (LPE) exploits targeting…
Extract and execute a PE embedded within a PNG file using an LNK file. The PE file is encrypted using…
Embark on the journey of becoming a certified Red Team professional with our definitive guide. This article provides a comprehensive…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is a 100% custom-built C# LDAP…
There are a number of excellent tutorials. I recommend this one: Basically, you are going to create a .htaccess file…
In the evolving landscape of cybersecurity, understanding and mitigating threats through advanced tools is paramount. "EDRenum-BOF" emerges as a critical…
This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is…
In the evolving landscape of cybersecurity, understanding the mechanisms behind vulnerabilities is crucial for both mitigation and responsible exploitation. This…
This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database(go-exploitdb) can be searched…