Cyber security

LsassReflectDumping – A Deep Dive Into Secure Credential Extraction Techniques

This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is…

1 year ago

CVE-2024-30090 : LPE Proof Of Concept Detailed

In the evolving landscape of cybersecurity, understanding the mechanisms behind vulnerabilities is crucial for both mitigation and responsible exploitation. This…

1 year ago

go-exploitdb : A Comprehensive Guide To Managing Exploit Databases

This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database(go-exploitdb) can be searched…

1 year ago

Cybersecurity Conferences – A Comprehensive Slide Collection

Comprehensive repository for presentation slides from major cybersecurity conferences held in 2023 and 2024. It provides quick access to the…

1 year ago

Operation Archive – Documenting The Dark Web’s Takedown

This repository will be used to add documents, pictures, etc on LEA efforts; Indictments, Seizure Warrants, Raids with photos/video, Online…

1 year ago

RedELK – Enhancing Red Team Operations And Blue Team Detection Through Centralized SIEM

Short: a Red Team's SIEM. Longer: a Red Team's SIEM that serves two main goals: Enhanced usability and overview for…

1 year ago

OXO Scan Orchestration Engine – A Comprehensive Guide To Scalable Security Assessments

OXO is a security scanning framework built for modularity, scalability and simplicity. OXO Engine combines specialized tools to work cohesively…

1 year ago

EDR-Antivirus-Bypass-To-Gain-Shell-Access

This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique. The code executes…

1 year ago

GShark – A Comprehensive Guide To Sensitive Information Management System Deployment

The project is based on Go and Vue to build a management system for sensitive information detection. For the full…

1 year ago

Generating Keys And Packages – A Guide To Securing RedELK Server Communications

This step generates TLS key pairs. This is used for encrypting the filebeat traffic between redirectors/C2servers and the RedELK server.…

1 year ago