Cyber security

DeadPotato – Harnessing Advanced System Tools For Security And Administration

The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new capabilities…

3 months ago

Would You Like To Know More In Tartufo – Cleaning Up Git Repositories Of Sensitive Data

If the other documentation left you wondering what to do with the results of your scans, and unsure how to…

4 months ago

QuickShell – Advanced Vulnerabilities And Tools For Quick Share At DEF CON 32

This project showcases the vulnerability research that we conducted on Quick Share, which we presented at DEF CON 32 (2024).…

4 months ago

Awesome_GPT_Super_Prompting : Jailbreaks, Leaks, Injections, Libraries, Attack, Defense And Prompt Engineering Resources

A comprehensive guide exploring the nuances of GPT jailbreaks, prompt injections, and AI security. This article unpacks an arsenal of…

4 months ago

CVE-2024-38473 Nuclei Template : Mastering Apache ACL Bypass Techniques

Nuclei template designed to detect Apache servers vulnerable to CVE-2024-38473. It first identifies servers running Apache < 2.4.60 with default PHP-FPM…

4 months ago

RS-Shell : A Rust-Based Reverse Shell Solution For Modern Cybersecurity Needs

RS-Shell is reverse shell solution developped in Rust with client, implant and server embedded in the same binary. This project…

4 months ago

Graphpython – A Comprehensive Tool For Microsoft Graph API Enumeration And Exploitation

Graphpython is a modular Python tool for cross-platform Microsoft Graph API enumeration and exploitation. It builds upon the capabilities of…

4 months ago

CompTIA – Understanding Techniques, Threats, And Cybersecurity Defenses

Explore the essential concepts, techniques, and security challenges covered in the CompTIA Security+ certification 1.1 - Compare And Contrast Different…

4 months ago

MagiskEoP – Unpacking The Silent Root Exploit In Magisk

This is an exploit for a vulnerability in Magisk app that allows a local app to silently gain root access…

4 months ago

VeilTransfer – Mastering Data Exfiltration Simulation For Enhanced Cybersecurity

VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration…

4 months ago