DE-TH-Aura, an initiative by SecurityAura, focuses on enhancing detection engineering and threat hunting capabilities using KQL (Kusto Query Language). This…
MassVulScan is a powerful network scanning tool designed for pentesters and system administrators to identify open ports and potential security…
The-XSS-Rat, an experienced ethical hacker, provides valuable insights into the world of cross-site scripting (XSS) through comprehensive guides and strategies.…
NimPlant C2 is a minimal Proof-of-Concept (PoC) beacon written in C, designed to operate as truly Position Independent Code (PIC)…
Research publications often introduce innovative tools and methodologies to address complex challenges in technology and cybersecurity. Two notable examples—Near-Native Rehosting…
Ensuring the security of Solana smart contracts is crucial to prevent exploits and maintain the integrity of blockchain applications. The…
BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and Endpoint Detection and Response (EDR)…
ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows Protected Process Light (PPL) by…
Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability. This exploit, developed by Alfie…
Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They ensure that hackers provide clear,…