Cyber security

Tweet-Machine : Hidden Twitter Histories With Advanced OSINT Capabilities

Tweet-Machine is an Open-Source Intelligence (OSINT) tool designed to retrieve deleted tweets and replies from any Twitter user, even if…

7 months ago

2025-03-04 (Tuesday) : Group Claiming To Be BianLian Sends Paper-Based Extortion Letters via Postal Service

On March 4, 2025, a group claiming to be the notorious threat actor BianLian began sending paper-based extortion letters to…

7 months ago

Blindsight : Advanced Techniques In Red Teaming And LSASS Memory Exploitation

Blindsight is a red teaming tool designed to dump LSASS (Local Security Authority Subsystem Service) memory on Windows systems, bypassing…

7 months ago

PowerShell-Hunter : A Comprehensive Toolset For Threat Hunting

PowerShell-Hunter is a robust collection of PowerShell-based tools designed to aid security analysts in detecting and investigating malicious activities within…

7 months ago

DE-TH-Aura : Detection Engineering And Threat Hunting By SecurityAura

DE-TH-Aura, an initiative by SecurityAura, focuses on enhancing detection engineering and threat hunting capabilities using KQL (Kusto Query Language). This…

7 months ago

MassVulScan : A Comprehensive Network Scanning Tool

MassVulScan is a powerful network scanning tool designed for pentesters and system administrators to identify open ports and potential security…

7 months ago

The-XSS-Rat : A Comprehensive Guide To Cross-Site Scripting Tools And Strategies

The-XSS-Rat, an experienced ethical hacker, provides valuable insights into the world of cross-site scripting (XSS) through comprehensive guides and strategies.…

7 months ago

NimPlant C2 : A Position Independent Code (PIC) Beacon

NimPlant C2 is a minimal Proof-of-Concept (PoC) beacon written in C, designed to operate as truly Position Independent Code (PIC)…

7 months ago

Tools Function In Research Publications: Enhancing Firmware Security And Performance

Research publications often introduce innovative tools and methodologies to address complex challenges in technology and cybersecurity. Two notable examples—Near-Native Rehosting…

7 months ago

Solana Smart Contract Security Best Practices: Essential Tools And Functions

Ensuring the security of Solana smart contracts is crucial to prevent exploits and maintain the integrity of blockchain applications. The…

7 months ago