tartufo has a wide variety of options to customize its operation available on the command line. Some of these options, however, can…
Sysdig Inspect is a powerful opensource interface for container troubleshooting and security investigation Inspect's user interface is designed to intuitively navigate…
We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…
This is a research command and control framework. What I mean by this, is that it is meant for research purposes.…
TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…
This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…
Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students…
SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…
In the ever-evolving landscape of cybersecurity, DEFCON 32 unveiled pioneering tools that challenge traditional security paradigms. The "ShimMe" talk introduced…
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…