GraphRunner : The Dual-Use Toolset For Microsoft 365 Security

0
GraphRunner is a powerful post-exploitation toolset designed for interacting with the Microsoft Graph API, enabling red teams and attackers to perform reconnaissance, persistence, and...

NailaoLoader : Hiding Execution Flow via Patching

0
NailaoLoader employs sophisticated techniques to obscure its execution flow, leveraging Windows Management Instrumentation (WMI) for lateral movement and file transfer. Threat actors use WMI...

CVE-2025-21333-POC : An In-Depth Exploration Of Windows Kernel Exploitation Techniques

0
The CVE-2025-21333 Proof of Concept (PoC) demonstrates an exploit targeting a vulnerability in the vkrnlintvsp.sys driver on Windows systems. This article delves into the...

Powershell Digital Forensics And Incident Response

0
PowerShell has emerged as a vital tool in Digital Forensics and Incident Response (DFIR), offering robust capabilities for automating data collection, analysis, and containment...

Brainstorm : Revolutionizing Web Fuzzing With Local LLMs

0
Brainstorm is an innovative web fuzzing tool that integrates traditional fuzzing techniques with AI-powered insights, leveraging local Large Language Models (LLMs) via Ollama to...

NativeBypassCredGuard : Bypassing Credential Guard With NTAPI Functions

0
NativeBypassCredGuard is a specialized tool designed to bypass Microsoft's Credential Guard, a security feature that protects sensitive credentials like NTLM password hashes and Kerberos...

PyClassInformer : An Advanced RTTI Parsing Plugin For IDA Pro

0
PyClassInformer is an IDAPython-based plugin designed for parsing Run-Time Type Information (RTTI) in C++ binaries. While existing tools like Class Informer and SusanRTTI offer...

NSSM : Essential Guide To Non-Sucking Service Manager For Windows Services

0
The Non-Sucking Service Manager (NSSM) is a lightweight, open-source utility designed to simplify the management of Windows services. It allows users to run any...

PS5 UMTX Jailbreak : Comprehensive Guide And Analysis

0
The PS5 UMTX Jailbreak is a webkit-based kernel exploit developed by SpecterDev and other contributors, designed to unlock specific features of the PlayStation 5....

Spice86 – A PC Emulator For Real Mode Reverse Engineering

0
Spice86 is an advanced PC emulator designed for reverse engineering and rewriting real-mode DOS programs, especially when the source code is unavailable. Built on...
Nmap Cheat Sheet

Nmap cheat sheet for beginners

0
Nmap (Network Mapper) is a free tool that helps you find devices on a network, discover open ports, and identify services running on those...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...