Cyber security

Using Hardware -Based Exploits : A Comprehensive Guide To Braktooth, Internalblue, And Automated Techniques

You need to buy the following hardware to be able to run the exploits: The installation is partially automated in…

11 months ago

Manual Exploits – Assessing Device Security Through Direct Interaction

This check could be used to assess the severity of the attacks. If the target device is pairable even if…

11 months ago

Awesome Red Teaming – A Comprehensive Guide To Advanced Security Techniques

Explore the dynamic world of red teaming with our extensive guide designed for cybersecurity professionals and enthusiasts alike. 'Awesome Red…

11 months ago

Awesome OSINT – A Comprehensive Resource For Cybersecurity Experts

A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources.…

11 months ago

CLI Usage : Command-Line Mastery With The BlueKit Toolkit

Explore the comprehensive command-line interface (CLI) of the BlueKit toolkit designed for cybersecurity professionals. This article delves into the various…

11 months ago

WinRM Client Certificate Authentication : Step-By-Step Setup And Configuration Guide

This repo demonstrates how to create certificates for WinRM/WSMan client certificate authentication and how to configure Windows to setup the…

11 months ago

Project Horus – The Comprehensive Toolkit For Investigation Assistance

Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages advanced APIs and data compilation…

11 months ago

CVE-2024-29824 : Exploring The Remote Code Execution Vulnerability In Ivanti EPM

In recent developments, a significant security vulnerability has emerged within Ivanti Endpoint Manager (EPM), identified as CVE-2024-29824. This critical flaw…

11 months ago

Security Ninjas AppSec Training – Your Complete Guide To Mastering Application Security

This hands-on training lab consists of 10 fun real world like hacking exercises, corresponding to each of the OWASP Top…

11 months ago

Certiception – Reinventing Network Security With Deceptive Active Directory Certificate Services

Certiception is a honeypot for Active Directory Certificate Services (ADCS), designed to trap attackers with a realistic and attractive bait…

11 months ago