This is a research command and control framework. What I mean by this, is that it is meant for research purposes.…
TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…
This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…
Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students…
SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…
In the ever-evolving landscape of cybersecurity, DEFCON 32 unveiled pioneering tools that challenge traditional security paradigms. The "ShimMe" talk introduced…
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…
Dive into the latest advancements with the release of v2.4.11, which brings significant enhancements and new features to the forefront.…
As part of our goal to provide a comprehensive open source security solution for all, we have been consolidating all…
CyberChef has a useful Node.js API, but sometimes we want to be able to programmatically run CyberChef recipes in languages…