Cyber security

BGPipe – BGP Reverse Proxy And Firewall

An innovative open-source tool that revolutionizes BGP management by acting as a reverse proxy and firewall. Leveraging the powerful BGPFix…

1 year ago

Sinon – Modular Windows Burn-In Automation With Generative AI For Deception

Sinon is a modular tool for automatic burn-in of Windows-based deception hosts that aims to reduce the difficulty of orchestrating…

1 year ago

Android Autorooter Exploit : A Step-By-Step Guide

"Android Autorooter" delves into the cutting-edge possibilities of exploiting Android vulnerabilities to achieve root access. This article guides you through…

1 year ago

Web3 Security Researcher Roadmap – Mastering Solidity And Smart Contract Audits By 2024

Embark on a journey to become a Web3 security expert with our comprehensive 2024 roadmap. This guide delves deep into…

1 year ago

Awesome TLS – Evading WAFs With Advanced Burp Suite Extension

This extension hijacks Burp's HTTP and TLS stack, allowing you to spoof any browser TLS fingerprint (JA3). It boosts the…

1 year ago

SMBclient-ng : A Comprehensive Tool For Managing SMB Shares

SMBclient-ng is a robust and intuitive command-line tool designed to enhance interactions with SMB shares, offering a plethora of commands…

1 year ago

Red Team Interview Questions – A Deep Dive Into Red Teaming Essential

Welcome to the Red Team Interview Questions repository! This repository aims to provide a comprehensive list of topics and questions…

1 year ago

Pathfinder : High-Resolution Control-Flow Attacks Exploiting The Conditional Branch Predictor

Researchers delve into the vulnerabilities inherent in Intel's branch prediction algorithms. Highlighting novel control-flow attacks, the study showcases techniques that…

1 year ago

vArmor : Enhancing Container Security In Cloud-Native Environments

vArmor is a cloud-native container sandbox system. It leverages Linux's AppArmor LSM, BPF LSM and Seccomp technologies to implement enforcers. It can be used to…

1 year ago

DOLOST – Harnessing Cyber Deception For Strategic Security Deployments

Explore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception. This tool automates the deployment of decoys…

1 year ago