Cyber security

CVE-2023-36723 – Windows Sandbox Directory Creation Vulnerability

This is PoC for arbitrary directory creation bug in Container Manager service. This PoC is not thoroughly tested so it…

1 year ago

The Elastic Container Project – Streamlining Security Research With A Quick Setup Guide

Stand up a 100% containerized Elastic stack, TLS secured, with Elasticsearch, Kibana, Fleet, and the Detection Engine all pre-configured, enabled…

1 year ago

Coerced Potato – Windows Privilege Escalation

In the realm of cybersecurity, understanding the vulnerabilities within operating systems is paramount. "Coerced Potato" delves into the intricate world…

1 year ago

G3nius Tools Sploit – Your Ultimate Guide To Advanced Penetration Testing

G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and…

1 year ago

POSTDump – Evading Detection And Safely Dumping LSASS Memory

Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# / .NET…

1 year ago

Guide-CEH-Practical-Master – Tools, Techniques And Exam Mastery

Welcome to the 'Guide-CEH-Practical-Master', your essential roadmap to mastering the Certified Ethical Hacker (Practical) exam. Dive deep into the tools,…

1 year ago

LatLoader – Evading Elastic EDR In Lateral Movement

LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this…

1 year ago

Telegram Explorer (TEx) – The Ultimate Toolkit for Telegram Data Analysis

TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the…

1 year ago

HackSys Extreme Vulnerable Driver – A Deep Dive into HEVD Exploitation

The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills…

1 year ago

Exploring the Inextricable Link Between Digital Forensics and Cybersecurity

Cybercrime grows in scope and complexity as technology becomes more widely used worldwide. Businesses are being targeted by cybercriminals more…

1 year ago