Cyber security

Digital Frontier : Introducing Ominis-OSINT, The Ultimate Web Hunter Tool

Information Obtained Discover online mentions of a query or username. Identify potential social profiles and forums. -- NOTE: Hello World 🌍 👋 -…

1 year ago

Upgrading Tartufo – A Comprehensive Guide To Transitioning From Release 2 To Release 3

Upgrading tartufo from release 2 to release 3 introduces some behavioral and interface changes. Current users of release 2 should review this…

1 year ago

Configuration in Tartufo – A Comprehensive Guide To Customizing Security Scans

tartufo has a wide variety of options to customize its operation available on the command line. Some of these options, however, can…

1 year ago

Sysdig Inspect – A Comprehensive Guide To Container Troubleshooting And Securit

Sysdig Inspect is a powerful opensource interface for container troubleshooting and security investigation Inspect's user interface is designed to intuitively navigate…

1 year ago

CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…

1 year ago

Tempest – A Rust Journey Through Command And Control Research

This is a research command and control framework. What I mean by this, is that it is meant for research purposes.…

1 year ago

TrickDump – Evading Detection With Advanced Memory Dump Techniques

TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…

1 year ago

Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources

This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…

1 year ago

100 Red Team Projects – A Comprehensive Guide For Pentesters And Network Managers

Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students…

1 year ago

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…

1 year ago