Cyber security

Cameradar – Your Comprehensive Guide To RTSP Stream Access And Security

In the age of digital surveillance and connectivity, access to RTSP (Real-Time Streaming Protocol) streams plays a pivotal role in…

11 months ago

Elitewolf – Critical Infrastructure Security Insights

This repository contains various ICS/SCADA/OT focused signatures and analytics. The end goal is to enable Critical Infrastructure Defenders, Intrusion Analysts,…

11 months ago

SubCat – A Fast And Efficient Subdomain Enumeration Tool

SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple…

11 months ago

CVE-2023-22515 Scanner – Detecting Atlassian Confluence Vulnerability

This is simple scanner for CVE-2023-22515, a critical vulnerability in Atlassian Confluence Data Center and Server that is actively being exploited…

11 months ago

Msprobe – On-Prem Microsoft Solutions Discovery For Security

Discovering and securing on-premises Microsoft solutions is paramount in today's cybersecurity landscape. In this article, we delve into 'msprobe,' a…

11 months ago

Aftermath – Swift-Powered Incident Response And Data Analysis

Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently…

11 months ago

Dangerzone – Safely Convert Risky Documents Into Secure PDFs

Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF. Dangerzone works like this: You…

11 months ago

CVE-2023-36723 – Windows Sandbox Directory Creation Vulnerability

This is PoC for arbitrary directory creation bug in Container Manager service. This PoC is not thoroughly tested so it…

11 months ago

The Elastic Container Project – Streamlining Security Research With A Quick Setup Guide

Stand up a 100% containerized Elastic stack, TLS secured, with Elasticsearch, Kibana, Fleet, and the Detection Engine all pre-configured, enabled…

11 months ago

Coerced Potato – Windows Privilege Escalation

In the realm of cybersecurity, understanding the vulnerabilities within operating systems is paramount. "Coerced Potato" delves into the intricate world…

11 months ago