Cyber security

Aftermath – Swift-Powered Incident Response And Data Analysis

Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently…

2 years ago

Dangerzone – Safely Convert Risky Documents Into Secure PDFs

Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF. Dangerzone works like this: You…

2 years ago

CVE-2023-36723 – Windows Sandbox Directory Creation Vulnerability

This is PoC for arbitrary directory creation bug in Container Manager service. This PoC is not thoroughly tested so it…

2 years ago

The Elastic Container Project – Streamlining Security Research With A Quick Setup Guide

Stand up a 100% containerized Elastic stack, TLS secured, with Elasticsearch, Kibana, Fleet, and the Detection Engine all pre-configured, enabled…

2 years ago

Coerced Potato – Windows Privilege Escalation

In the realm of cybersecurity, understanding the vulnerabilities within operating systems is paramount. "Coerced Potato" delves into the intricate world…

2 years ago

G3nius Tools Sploit – Your Ultimate Guide To Advanced Penetration Testing

G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and…

2 years ago

POSTDump – Evading Detection And Safely Dumping LSASS Memory

Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# / .NET…

2 years ago

Guide-CEH-Practical-Master – Tools, Techniques And Exam Mastery

Welcome to the 'Guide-CEH-Practical-Master', your essential roadmap to mastering the Certified Ethical Hacker (Practical) exam. Dive deep into the tools,…

2 years ago

LatLoader – Evading Elastic EDR In Lateral Movement

LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this…

2 years ago

Telegram Explorer (TEx) – The Ultimate Toolkit for Telegram Data Analysis

TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the…

2 years ago