Cyber security

Configuration in Tartufo – A Comprehensive Guide To Customizing Security Scans

tartufo has a wide variety of options to customize its operation available on the command line. Some of these options, however, can…

10 months ago

Sysdig Inspect – A Comprehensive Guide To Container Troubleshooting And Securit

Sysdig Inspect is a powerful opensource interface for container troubleshooting and security investigation Inspect's user interface is designed to intuitively navigate…

10 months ago

CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…

10 months ago

Tempest – A Rust Journey Through Command And Control Research

This is a research command and control framework. What I mean by this, is that it is meant for research purposes.…

10 months ago

TrickDump – Evading Detection With Advanced Memory Dump Techniques

TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…

10 months ago

Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources

This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…

10 months ago

100 Red Team Projects – A Comprehensive Guide For Pentesters And Network Managers

Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students…

10 months ago

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…

10 months ago

SHIMME – Manipulating Shim And Office For Code Injection

In the ever-evolving landscape of cybersecurity, DEFCON 32 unveiled pioneering tools that challenge traditional security paradigms. The "ShimMe" talk introduced…

10 months ago

Nipe – Pioneering Privacy And Anonymity On The Internet With Tor

The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…

10 months ago