Apache HTTP Server Vulnerability Testing Tool

0
This repository provides a Proof of Concept (PoC) for testing various vulnerabilities in the Apache HTTP Server, including Filename Confusion Attacks, SSRF, Denial of...

SharpRDPHijack : A .NET Utility For RDP Session Hijacking

0
Sharp RDP Hijack is a proof-of-concept .NET/C# Remote Desktop Protocol (RDP) session hijack utility. RDP session hijacking is a post-exploitation technique for taking control of...

Shadowsocks : The Ultimate Guide To Features, Installation, And Configuration

0
hickory-dns - Uses hickory-resolver as DNS resolver instead of tokio's builtin. local-http - Allow using HTTP protocol for sslocal local-http-native-tls - Support HTTPS with native-tls local-http-rustls -...

Flyphish : Mastering Cloud-Based Phishing Simulations For Security Assessments

0
Flyphish is an Ansible playbook allowing cyber security consultants to deploy a phishing server in the cloud for security assessments. The playbook installs and configures...

LLM Lies : Hallucinations Are Not Bugs, But Features As Adversarial Examples

0
LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from hallucination—fabricating non-existent facts to cheat users without perception. And the reasons for their existence and pervasiveness...

Kali Linux 2024.4 Released, What’s New?

0
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and new features for cybersecurity professionals and ethical hackers. Here...

GPOHunter – Active Directory Group Policy Security Analyzer

0
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory Group Policy Objects (GPOs). It automates security checks and...
2024 MITRE ATT&CK Evaluation

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection &...

0
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To...

SecHub : Streamlining Security Across Software Development Lifecycles

0
The free and open-source security platform SecHub, provides a central API to test software with different security tools. SecHub supports many free and open-source...

DarkFlare : Bypassing Censorship With TCP-Over-CDN Technology

0
A stealthy command line tool to create TCP-over-CDN(http) tunnels that keep your connections cozy and comfortable. Now with public test relay servers! What Is This...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...
mv command

How to Move and Rename Files in Linux with the mv Command

0
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy to relocate or rename items without hassle. Whether organizing...