A Feminist Guide to Digital Defense serves as a comprehensive resource for enhancing online safety and privacy through a feminist…
This is a proof of concept for CVE-2024-25153, a Remote Code Execution vulnerability in Fortra FileCatalyst Workflow 5.x, before 5.1.6…
In the shadowy realms of cyber espionage, the Kimsuky PowerShell Backdoor stands as a sophisticated tool designed for stealthy infiltrations…
A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak…
Digital Forensics and Incident Response (DFIR) teams are groups of people in an organization responsible for managing the response to…
DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing…
A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and…
This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox,…
DarkGPT unveils the shadowy corners of cyberspace by granting access to leaked databases through a cutting-edge AI powered by GPT-4-200K.…
A curated list of awesome Hacking. Inspired by awesome-machine-learning If you want to contribute to this list (please do), send me…