Cyber security

Automated Multi UAC Bypass – Streamlining Elevation Across Windows Versions

In today's digital landscape, navigating User Account Control (UAC) prompts efficiently across various Windows operating system versions is a critical…

2 years ago

TPM Sniffing – Unveiling Methods To Retrieve Bitlocker Keys Through Hardware Communication Channels

Retrieving Bitlocker keys from the TPM using SPI, I2C or LPC communications requires an understanding of the specific protocol supported…

2 years ago

H4X-Tools : Empowering OSINT Enthusiasts With A Comprehensive Toolkit

Discover the power of H4X-Tools, a versatile toolkit designed for scraping, OSINT (Open-Source Intelligence), and beyond. From extracting information from…

2 years ago

Hashcat – Unleashing The Power Of The World’s Fastest And Most Advanced Password Recovery Utility

Hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized…

2 years ago

Introduction To Cryptography – The Vigenère Cipher : Racking The Code And Exploring Its Challenges

In my first cryptography blogpost I introduced some definitions and concepts, one of them was the concept of substitution ciphers. In short, those…

2 years ago

LLVM-YX-Callobfuscator : Enhancing Windows x64 Native Call Security At Compile Time

A powerful LLVM plugin designed to bolster the security of Windows x64 native calls during the compilation process. This innovative…

2 years ago

MobSF Remote Code Execution (CVE-2024-21633) – Uncovering Vulnerabilities In Mobile Security Framework

I have found an arbitrary file write in apktool and reported via github security advisory. I was aware that many projects…

2 years ago

Watchman – Your Malware Alert Bot with Notion, Slack, And BetterUptime Integration

The vigilant configuration change alerting and incident escalation bot designed to safeguard your digital world. In this article, we'll explore…

2 years ago

pphack : The Advanced Client-Side Prototype Pollution Scanner

The cutting-edge Client-Side Prototype Pollution Scanner. In this article, we'll delve into the installation process, usage, and features of pphack,…

2 years ago

BugBlaze : Your All-In-One Cybersecurity Toolkit

In the world of cybersecurity, staying ahead of potential threats is essential. BugBlaze is a powerful toolkit that simplifies the…

2 years ago