Azure-SecOps : Streamlining Security Operations In The Cloud
Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation, and compliance in Microsoft's Azure ecosystem....
Linkook : A Comprehensive OSINT Tool For Social Media Investigations
Linkook is a powerful Open Source Intelligence (OSINT) tool designed to uncover interconnected social media accounts and associated emails across multiple platforms using a...
BlackBasta Chat : The Inner Workings Of A Notorious Ransomware Group
The recent leak of Black Basta’s internal communications, spanning over 200,000 chat messages, has provided an unprecedented look into the operations and internal dynamics...
MSFTRecon : A Powerful Reconnaissance Tool For Microsoft 365 And Azure
MSFTRecon is a specialized reconnaissance tool designed for red teamers and security professionals to map and analyze Microsoft 365 and Azure tenant infrastructures.
Its...
CVE-2025-21420 Proof-of-Concept : Elevation Of Privilege via Disk Cleanup Tool
CVE-2025-21420 is a recently disclosed vulnerability in the Windows Disk Cleanup Tool (cleanmgr.exe) that allows attackers to escalate privileges to SYSTEM level through DLL...
Lemmy : A Decentralized Link Aggregator And Forum For The Fediverse
Lemmy is an innovative, open-source platform designed for link aggregation and discussion, providing a decentralized alternative to traditional platforms like Reddit.
Built with Rust,...
PatchWerk : A Tool For Cleaning NTDLL Syscall Stubs
PatchWerk is a proof-of-concept (PoC) tool designed to clean NTDLL syscall stubs by patching syscall hooks without requiring a handle to the NTDLL library....
Modern Network Fingerprinting : HASSH And JA4+SSH Tools
Network fingerprinting is a critical technique for identifying and analyzing network traffic patterns, particularly in encrypted protocols.
Two modern tools, HASSH and JA4+SSH, have...
SkyFall-Pack : Infrastructure Automation For C2 Operations
SkyFall-Pack is an advanced infrastructure automation toolkit designed for Command and Control (C2) operations.
It integrates Cloudflare Workers for traffic redirection and an Azure...
LummaC2 Stealer : Unpacking The Threats Of A Marketed ‘Premium’ Malware
LummaC2 is a commodity malware designed as an information stealer, targeting browsers, cryptocurrency wallets, and authentication data.
Marketed as a "premium" infostealer on underground...