This is a simulation of attack by the Wicked Panda group (APT-41) targeting U.S. state government networks the attack campaign…
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple services.Inspired by Cybergordon and…
Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime. Currently, the application supports only Android libapp.so. Also, the…
This repo contains all variants of information security & Bug bounty & Penetration Testing write-up design for beginners or newcomers…
site:*/sign-in site:*/account/login site:*/forum/ucp.php?mode=login inurl:memberlist.php?mode=viewprofile intitle:"EdgeOS" intext:"Please login" inurl:user_login.php intitle:"Web Management Login" site:*/users/login_form site:*/access/unauthenticated site:account.*.*/login site:admin.*.com/signin/ site:portal.*.com/signin/ inurl:adminpanel/index.php site:*/login/auth site:*/index.jsp intitle:"login"…
Prompt injection is a type of security vulnerability that can be exploited to control the behavior of a ChatGPT instance.…
Terminal GPT (tgpt) offers a seamless way to bring the power of ChatGPT 3.5 directly to your command line. This…
In 2025 I wanted to try something new. In addition to a traditional 100 days of Yara, I will also…
Jailbreak is an attack that prompts a language model to give actionable responses to harmful behaviors, such as writing an…
The main philosophy of HASH is to be easy to configure and flexible to mimic any software running on HTTP/HTTPs.…