Cyber security

AIGoat : A Deliberately Vulnerable AI Infrastructure

AI-Goat is an innovative open-source platform designed to address the growing need for hands-on training in AI security. Developed by…

3 weeks ago

Summarized Defender For Endpoint Antivirus Detection By Endpoint

Microsoft Defender for Endpoint provides comprehensive endpoint security by leveraging advanced detection, investigation, and response capabilities. One of its powerful…

3 weeks ago

CVE-2024-55591 : Fortinet FortiOS Authentication Bypass Vulnerability

CVE-2024-55591 is a critical authentication bypass vulnerability affecting Fortinet's FortiOS and FortiProxy systems. This flaw, rated with a CVSS score…

3 weeks ago

Awesome-Red-Team-Operation : A Comprehensive Toolkit For Advanced Cybersecurity

The "Awesome-Red-Team-Operation" repository is a comprehensive collection of tools designed to support red team operations, penetration testing, and cybersecurity assessments.…

3 weeks ago

Krueger : Exploiting Windows Defender To Neutralize EDR Systems

Krueger is a Proof of Concept (PoC) .NET post-exploitation tool designed to disable Endpoint Detection and Response (EDR) systems during…

3 weeks ago

AntiCrack DotNet : Advanced Protection For .NET Assemblies

AntiCrack DotNet is a sophisticated .NET project designed to safeguard software by implementing advanced anti-debugging, anti-virtualization, anti-injection, and anti-hooking techniques.…

4 weeks ago

StoneKeeper C2 : A Research-Oriented Command-And-Control Framework For EDR Evasion

The StoneKeeper C2 is an experimental command-and-control (C2) framework designed for research purposes, focusing on modern Windows malware tactics and…

4 weeks ago

The Silk Wasm : Revolutionizing HTML Smuggling Through WebAssembly

The Silk Wasm is a tool designed to obfuscate HTML smuggling techniques using WebAssembly (Wasm). HTML smuggling is a method…

4 weeks ago

TokenSmith : A Versatile Tool For Entra ID Token Management

TokenSmith is a powerful tool designed to generate Entra ID access and refresh tokens, catering to offensive engagements such as…

4 weeks ago

Sunder : A Windows Rootkit Exploiting Vulnerable Drivers For Kernel-Level Attacks

Sunder is a Windows rootkit inspired by the Lazarus Group's FudModule rootkit, designed to exploit vulnerabilities in kernel drivers to…

4 weeks ago