Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# / .NET…
Welcome to the 'Guide-CEH-Practical-Master', your essential roadmap to mastering the Certified Ethical Hacker (Practical) exam. Dive deep into the tools,…
LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this…
TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the…
The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills…
Cybercrime grows in scope and complexity as technology becomes more widely used worldwide. Businesses are being targeted by cybercriminals more…
Enhancing Proposal Management Proposal management can be a complex task. Companies across all industries face various challenges when managing the…
Awesome VirusTotal Enterprise Search Queries (formerly Virustotal Intelligence or VTI). In today's evolving cyber landscape, effective threat hunting is paramount.…
The innovative solution designed to streamline your search processes in cloud storage. By bypassing traditional log indexing in SIEMs, CloudGrep…
ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT. Its goal…