Cyber security

InvisibilityCloak – A Game-Changer In C# Post-Exploitation Tools

Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project. Change…

2 years ago

Awesome-BEC – Unveiling A Comprehensive Resource For Business Email Compromise Investigations

A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains…

2 years ago

SharpVeeamDecryptor – Unlocking The Secrets Of Veeam

Decrypt Veeam database passwords. Needs to be run from an elevated context on the Veeam Backup/Database Server. I did not…

2 years ago

Honeypots Detection – Using Nuclei Templates For Effective Detection

Nuclei templates for honeypots detection. This repository contains Nuclei templates to detect several well-known open-source honeypots, such as: ADBHoney, Conpot,…

2 years ago

Callstack Spoofing + Indirect Syscalls POC – Unmasking Evasion Techniques In A Proof Of Concept (POC) Scenario

This project consists of a simple C++ self-Injecting dropper focused on EDR evasion POC. To implement it, I have combined…

2 years ago

GCR – Google Calendar RAT

Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those…

2 years ago

Technical Analysis Of BiBi – Windows Wiper Targeting Israeli Organizations

On 30th October, Security Joes Incident Response team discovered a new Linux Wiper named "BiBi-Linux" Wiper been deployed by Pro-Hamas Hacktivist group to destroy…

2 years ago

Exploring Tunneling Solutions – A Comprehensive Guide For Self-Hosters And Developers

The purpose of this list is to track and compare tunneling solutions. This is primarily targeted toward self-hosters and developers…

2 years ago

JSpector – Automated JavaScript Analysis In Burp Suite

JSpector is a Burp Suite extension that passively crawls JavaScript files and automatically creates issues with URLs, endpoints and dangerous…

2 years ago

CloudPulse – AWS Cloud Landscape Search Engine

During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later…

2 years ago