Cyber security

Pwn : Mastering The Art Of Digital Exploitation – Unveiling Advanced Techniques And Pwn2Own Triumphs

In the high-stakes world of cybersecurity, the art of "pwnage" represents not just a win, but a display of supreme…

10 months ago

All About Bug Bounty – A Detailed Resource On Vulnerabilities, Bypass Techniques, And Security Research

Diving into the world of bug bounty, this article serves as an essential toolkit for aspiring and seasoned security researchers…

10 months ago

DotNet-MetaData : A Deep Dive Into .NET Malware Analysis

"DotNet-MetaData: A Deep Dive into .NET Malware Analysis" unveils the advanced techniques for analyzing and classifying .NET-based malware. With a…

10 months ago

BlueSpy – PoC To Record Audio From A Bluetooth Device

This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without…

10 months ago

FinalRecon : The Ultimate All-In-One Web Reconnaissance Tool

FinalRecon is an all in one automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target…

10 months ago

ArtifactCollector : Unlocking Digital Forensics – A Comprehensive Guide

The artifactcollector project provides a software that collects forensic artifacts on systems. These artifacts can be used in forensic investigations…

10 months ago

VolWeb – Empowering Digital Forensics With Advanced Memory Analysis Tools

VolWeb is a digital forensic memory analysis platform that leverages the power of the Volatility 3 framework. It is dedicated…

10 months ago

Awesome Prompt Injection – Understanding And Mitigating AI Model Vulnerabilities

'Awesome Prompt Injection' delves into the intricate world of machine learning vulnerabilities, spotlighting the cunning exploits known as prompt injections.…

10 months ago

Awesome Security Card Games – Mastering Cybersecurity Through Play

Security card games help train your skills and enable discussions for various areas of security. Mastering Cybersecurity Through Play,' your…

10 months ago

Perfect DLL Proxy – Streamlining DLL Hijacking With Absolute Path Forwarding

In the complex landscape of cybersecurity, DLL hijacking stands out as a notable technique for exploiting software vulnerabilities. This article…

10 months ago