Cyber security

CloudRecon – Uncovering Hidden Cloud Assets With SSL Certificate Analysis

In the ever-evolving landscape of cybersecurity, red teamers and bug hunters are constantly seeking new tools to aid in their…

2 years ago

PipeViewer – Exploring Windows Named Pipes For Security And Permissions

PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is…

2 years ago

MetaHub – Revolutionizing Vulnerability Management With Contextual Impact Evaluation

MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management. You can use it with AWS…

2 years ago

Nysm : Unveiling The Art Of Stealthy eBPF Post-Exploitation Containers

In the ever-evolving landscape of cybersecurity, offensive tools based on eBPF (Extended Berkeley Packet Filter) have gained popularity, from credential…

2 years ago

Exploring Best EDR Of The Market (BEOTM) : Unveiling User-Mode Evasion Techniques and Defensive Strategies

BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) project, designed to serve as a testing ground for understanding…

2 years ago

Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.

The article "Demonized Shell: Advancing Linux Persistence Techniques and Security Implications" goes into great detail about D3m0n1z3dShell, a complex tool…

2 years ago

EDRSilencer: A Tool for Managing EDR Outbound Traffic with Windows Filtering Platform.

Inspired by the closed source FireBlock tool FireBlock from MdSec NightHawk, I decided to create my own version and this tool was…

2 years ago

Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets.

Of course! The piece "Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets" talks about a new tool for…

2 years ago

Red-Teamer Diaries: Insights and Techniques for Effective Penetration Testing

Publicly accessible notes about my pentesting/red teaming experiments tested on several controlled environments/infrastructures that involve playing with various tools and…

2 years ago

Windows Local Privilege Escalation Cookbook (In Progress)

Description (Keynote) This Cookbook was created with the main purpose of helping people understand local privilege escalation techniques on Windows…

2 years ago