Cyber security

GCR – Google Calendar RAT

Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those…

2 years ago

Technical Analysis Of BiBi – Windows Wiper Targeting Israeli Organizations

On 30th October, Security Joes Incident Response team discovered a new Linux Wiper named "BiBi-Linux" Wiper been deployed by Pro-Hamas Hacktivist group to destroy…

2 years ago

Exploring Tunneling Solutions – A Comprehensive Guide For Self-Hosters And Developers

The purpose of this list is to track and compare tunneling solutions. This is primarily targeted toward self-hosters and developers…

2 years ago

JSpector – Automated JavaScript Analysis In Burp Suite

JSpector is a Burp Suite extension that passively crawls JavaScript files and automatically creates issues with URLs, endpoints and dangerous…

2 years ago

CloudPulse – AWS Cloud Landscape Search Engine

During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later…

2 years ago

PoC For Dumping And Decrypting Cookies In The Latest Version Of Microsoft Teams

In the realm of cybersecurity, understanding the intricacies of cookie management and security is paramount. In this article, we delve…

2 years ago

Arsenal – Simplifying Pentesting With Your Ultimate Command Inventory

Arsenal is just a quick inventory, reminder and launcher for pentest commands.This project written by pentesters for pentesters simplify the…

2 years ago

The Future of Work and the Role of Digital Transformation

In today's rapidly evolving world, the way we work is undergoing a profound transformation. The digital age has ushered in…

2 years ago

CVE Collector – A Python Tool For Managing CVE Data

Discover how to create a powerful CVE Collector using Python. This article provides guidance on collecting, managing, and staying updated…

2 years ago

Qu1ckdr0p2 – A Powerful Tool For Rapidly Hosting Payloads And Post-Exploitation Bins

In the world of cybersecurity and penetration testing, speed and efficiency can make all the difference. Enter Qu1ckdr0p2, a versatile…

2 years ago