Cyber security

RedELK – Essential Naming Requirements For Deployment

In the complex landscape of RedELK deployment, adhering to precise naming requirements is crucial for operational success. This article delves…

5 months ago

Kdrill – Unveiling Rootkit Intrusions In Windows 64-Bit Systems

Kdrill is a tool to analyze the kernel land of Windows 64b systems (tested from Windows 7 to Windows 11).…

5 months ago

APKscan – Mastering Android Security Analysis

APKs (Android Package Kits) often leak secrets due to over-reliance on security through obscurity. Developers sometimes leave sensitive information such as API keys, tokens, and credentials hidden…

5 months ago

Akto.io – Comprehensive Security Testing And Inventory Management

Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used…

5 months ago

CCC : Cyberspace Under Siege – Understanding Crime, Espionage, And Conflict

This is a short graduate course providing an introduction to the areas of crime, espionage and conflicts in cyberspace. The…

5 months ago

VMware vCenter : CVE-2024-37081 Proof Of Concept

Este repositorio contiene una prueba de concepto (PoC) para la vulnerabilidad CVE-2024-37081 en VMware vCenter. La vulnerabilidad se debe a…

6 months ago

Mailgoose – Ensuring Email Security With SPF, DMARC, And DKIM Verification

Mailgoose is a web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set…

6 months ago

BGPipe – BGP Reverse Proxy And Firewall

An innovative open-source tool that revolutionizes BGP management by acting as a reverse proxy and firewall. Leveraging the powerful BGPFix…

6 months ago

Sinon – Modular Windows Burn-In Automation With Generative AI For Deception

Sinon is a modular tool for automatic burn-in of Windows-based deception hosts that aims to reduce the difficulty of orchestrating…

6 months ago

Android Autorooter Exploit : A Step-By-Step Guide

"Android Autorooter" delves into the cutting-edge possibilities of exploiting Android vulnerabilities to achieve root access. This article guides you through…

6 months ago