A groundbreaking tool revolutionizing Active Directory reconnaissance for Red Teams. By leveraging the obscure Active Directory Web Services (ADWS) protocol,…
Delve into the realm of network security with MinDNS, a lightweight DNS server crafted in Rust. Designed for versatility, it…
A formidable tool tailored for both dropper and post-exploitation scenarios on Windows systems. With its sophisticated capabilities including dynamic syscall…
Bypassing Memory Scanners The recent versions of Cobalt Strike have made it so easy for the operators to bypass memory…
Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates. This threat is…
This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices. The following Incident…
A vulnerability that serves as a bypass for the patched CVE-2023-21839 in Oracle WebLogic. This article delves into the exploit's…
In today's digital landscape, navigating User Account Control (UAC) prompts efficiently across various Windows operating system versions is a critical…
Retrieving Bitlocker keys from the TPM using SPI, I2C or LPC communications requires an understanding of the specific protocol supported…
Discover the power of H4X-Tools, a versatile toolkit designed for scraping, OSINT (Open-Source Intelligence), and beyond. From extracting information from…