Microsoft-Analyzer-Suite (Community Edition) : A Deep Dive Into Analyzing Microsoft 365 Security
Explore the capabilities of the Microsoft-Analyzer-Suite (Community Edition), a powerful collection of PowerShell scripts designed to enhance your security analysis.
This suite provides automated...
EDRPrison – Advanced Evasion Techniques Using Legitimate WFP Drivers
EDRPrison leverages a legitimate WFP callout driver, WinDivert, to effectively silence EDR systems. Drawing inspiration from tools like Shutter, FireBlock, and EDRSilencer, this project focuses on network-based evasion...
Using Hardware -Based Exploits : A Comprehensive Guide To Braktooth, Internalblue, And Automated Techniques
You need to buy the following hardware to be able to run the exploits: The installation is partially automated in the toolkit. Consult repository for...
Manual Exploits – Assessing Device Security Through Direct Interaction
This check could be used to assess the severity of the attacks. If the target device is pairable even if the user does not...
Awesome Red Teaming – A Comprehensive Guide To Advanced Security Techniques
Explore the dynamic world of red teaming with our extensive guide designed for cybersecurity professionals and enthusiasts alike.
'Awesome Red Teaming' offers a treasure trove...
Awesome OSINT – A Comprehensive Resource For Cybersecurity Experts
A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources.
In the intelligence community...
CLI Usage : Command-Line Mastery With The BlueKit Toolkit
Explore the comprehensive command-line interface (CLI) of the BlueKit toolkit designed for cybersecurity professionals.
This article delves into the various CLI commands and options...
WinRM Client Certificate Authentication : Step-By-Step Setup And Configuration Guide
This repo demonstrates how to create certificates for WinRM/WSMan client certificate authentication and how to configure Windows to setup the service side to allow...
Project Horus – The Comprehensive Toolkit For Investigation Assistance
Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes.
This comprehensive toolkit leverages advanced APIs and data compilation strategies to streamline your...
CVE-2024-29824 : Exploring The Remote Code Execution Vulnerability In Ivanti EPM
In recent developments, a significant security vulnerability has emerged within Ivanti Endpoint Manager (EPM), identified as CVE-2024-29824.
This critical flaw allows for remote code...