Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides foundational insights into browser internals and tools critical for...
Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on a suite of specialized tools to analyze and weaponize...
Full Spectrum Event Tracing For Windows Detection In The kernel Against Rootkits
Sanctum EDR demonstrates a multi-layered approach to detecting and preventing Event Tracing for Windows (ETW) tampering by rootkits, combining kernel-mode monitoring with user-space protections....
SpyAI : Intelligent Malware With Advanced Capabilities
SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze screenshots from entire monitors.
It utilizes Slack as a...
Proxmark3 : The Ultimate Tool For RFID Security And Analysis
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research, and development.
Originally created by Jonathan Westhues in 2007,...
Awesome Solana Security : Enhancing Program Development
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more secure Solana programs.
It provides a wide range of...
IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting the NGINX Ingress Controller for Kubernetes.
These vulnerabilities, including...
AdaptixC2 : Enhancing Penetration Testing With Advanced Framework Capabilities
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It offers a robust set of features that enhance the...
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to obfuscate and encrypt ELF binaries and #!-scripts, providing a...
Endpoint With Missing Agents : Identifying And Managing Security Gaps
Endpoint security is crucial for protecting organizations from cyber threats. However, managing endpoint agents can be challenging, especially when devices are missing critical security...