Tweet-Machine is an Open-Source Intelligence (OSINT) tool designed to retrieve deleted tweets and replies from any Twitter user, even if…
On March 4, 2025, a group claiming to be the notorious threat actor BianLian began sending paper-based extortion letters to…
Blindsight is a red teaming tool designed to dump LSASS (Local Security Authority Subsystem Service) memory on Windows systems, bypassing…
PowerShell-Hunter is a robust collection of PowerShell-based tools designed to aid security analysts in detecting and investigating malicious activities within…
DE-TH-Aura, an initiative by SecurityAura, focuses on enhancing detection engineering and threat hunting capabilities using KQL (Kusto Query Language). This…
MassVulScan is a powerful network scanning tool designed for pentesters and system administrators to identify open ports and potential security…
The-XSS-Rat, an experienced ethical hacker, provides valuable insights into the world of cross-site scripting (XSS) through comprehensive guides and strategies.…
NimPlant C2 is a minimal Proof-of-Concept (PoC) beacon written in C, designed to operate as truly Position Independent Code (PIC)…
Research publications often introduce innovative tools and methodologies to address complex challenges in technology and cybersecurity. Two notable examples—Near-Native Rehosting…
Ensuring the security of Solana smart contracts is crucial to prevent exploits and maintain the integrity of blockchain applications. The…