Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates. This threat is…
This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices. The following Incident…
A vulnerability that serves as a bypass for the patched CVE-2023-21839 in Oracle WebLogic. This article delves into the exploit's…
In today's digital landscape, navigating User Account Control (UAC) prompts efficiently across various Windows operating system versions is a critical…
Retrieving Bitlocker keys from the TPM using SPI, I2C or LPC communications requires an understanding of the specific protocol supported…
Discover the power of H4X-Tools, a versatile toolkit designed for scraping, OSINT (Open-Source Intelligence), and beyond. From extracting information from…
Hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized…
In my first cryptography blogpost I introduced some definitions and concepts, one of them was the concept of substitution ciphers. In short, those…
A powerful LLVM plugin designed to bolster the security of Windows x64 native calls during the compilation process. This innovative…
I have found an arbitrary file write in apktool and reported via github security advisory. I was aware that many projects…