Cyber security

ADOKit: Azure DevOps Services Attack Toolkit

Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by…

1 year ago

CreateToken: Exploiting ZwCreateToken() for SYSTEM Token

In the realm of cybersecurity, understanding and exploiting Windows APIs is pivotal for both defenders and attackers. In this article,…

1 year ago

LDAP Nom Nom: Insane-Speed Active Directory User Enumeration via LDAP Ping Exploitation

With the help of LDAP Ping requests (cLDAP), "LDAP Nom Nom" is a powerful tool that quickly and quietly brute-forces…

1 year ago

Mastering YARA: A Comprehensive Guide to Detection Engineering and Rule Development

Threat identification and analysis are very important for keeping systems and networks safe in the ever-changing world of cybersecurity. YARA…

1 year ago

Photo Location Finder: Using Google Cloud Vision API to Detect Landmarks and Labels in Images

This is a Python code to detect landmarks, labels and web entities in a set of images using Google Cloud…

1 year ago

APIDetector: Uncovering Swagger Endpoint Risks and How to Secure Your API

APIDetector is a powerful and efficient tool designed for testing exposed Swagger endpoints in various subdomains with unique smart capabilities…

1 year ago

Telegram Nearby Map: How to Find Nearby Users and Their Approximate Locations

Have you ever wondered if you could find Telegram users close and get a sense of where they are? You…

1 year ago

PacketSpy: A Powerful Network Packet Sniffing Tool for Analyzing Network Traffic

PacketSpy is a powerful network packet sniffing tool designed to capture and analyze network traffic. It provides a comprehensive set…

1 year ago

Nim-Shell: The Hidden Dangers and Importance of Cybersecurity

Cybersecurity is more important than ever in today's digitally connected world. As technology improves, so do the ways that bad…

1 year ago

NetworkSherlock: Porwerfull Port Scanning With Shodan

NetworkSherlock is a powerful and flexible port scanning tool designed for network security professionals and penetration testers. With its advanced capabilities,…

1 year ago