Cyber security

CVE-2023-22527 in Confluence : A Step-by-Step Guide And Its Implications

In the world of cybersecurity, staying informed about the latest vulnerabilities is crucial. One such vulnerability that has garnered attention…

1 year ago

YaraDbg – Simplifying Yara Rule Development And Analysis For Security Analysts

YaraDbg is a free web-based Yara debugger to help security analysts to write hunting or detection rules with less effort…

1 year ago

BrowserStealer (Chrome / Firefox / Microsoft Edge)- Unveiling Password And Data Theft In Browsers

A comprehensive exploration of a powerful software tool designed to extract passwords, cookies, history, and bookmarks from popular web browsers.…

1 year ago

Microsoft Defender For Endpoint Curated List Of Resources For DFIR – Microsoft Defender For Endpoint Guide

Hey, thank you stopping by! Well, being here means that you are either familiar with the discipline of Digital Forensics…

1 year ago

WebCopilot – A Comprehensive Subdomain Enumeration And Bug Detection Tool

WebCopilot is an automation tool designed to enumerate subdomains of the target and detect bugs using different open-source tools. The script…

1 year ago

Frown – An Instrumentation Challenge : Navigating The Setup And Solutions

In the world of cybersecurity and ethical hacking, challenges often serve as valuable training grounds for aspiring professionals. "Frown –…

1 year ago

Linux Kernel CVE-2023-6546 : Unveiling A Critical Vulnerability

This is a custom exploit which targets Ubuntu 18.04+20.04 LTS/Centos 8/RHEL 8 to attain root privileges via arbitrary kernel code…

1 year ago

GraphStrike – Empowering Cobalt Strike With Microsoft Graph API Integration

GraphStrike is a suite of tools that enables Cobalt Strike's HTTPS Beacon to use Microsoft Graph API for C2 communications. All Beacon…

1 year ago

AI Exploits – Vulnerabilities And Threats In Machine Learning Infrastructure

The AI world has a security problem and it's not just in the inputs given to LLMs such as ChatGPT.…

1 year ago

EchoDrv – Unveiling Kernel Vulnerabilities In ECHOAC Anti-Cheat Driver echo_driver.sys

In the realm of cybersecurity, the relentless battle between attackers and defenders rages on. Enter EchoDrv, a potent tool that…

1 year ago