BGPipe – BGP Reverse Proxy And Firewall
An innovative open-source tool that revolutionizes BGP management by acting as a reverse proxy and firewall.
Leveraging the powerful BGPFix library, bgpipe enhances security,...
Sinon – Modular Windows Burn-In Automation With Generative AI For Deception
Sinon is a modular tool for automatic burn-in of Windows-based deception hosts that aims to reduce the difficulty of orchestrating deception hosts at scale...
Android Autorooter Exploit : A Step-By-Step Guide
"Android Autorooter" delves into the cutting-edge possibilities of exploiting Android vulnerabilities to achieve root access.
This article guides you through setting up a self-executing...
Web3 Security Researcher Roadmap – Mastering Solidity And Smart Contract Audits By 2024
Embark on a journey to become a Web3 security expert with our comprehensive 2024 roadmap.
This guide delves deep into mastering Ethereum, Solidity, and...
Awesome TLS – Evading WAFs With Advanced Burp Suite Extension
This extension hijacks Burp's HTTP and TLS stack, allowing you to spoof any browser TLS fingerprint (JA3).
It boosts the power of Burp Suite...
SMBclient-ng : A Comprehensive Tool For Managing SMB Shares
SMBclient-ng is a robust and intuitive command-line tool designed to enhance interactions with SMB shares, offering a plethora of commands to manage and navigate...
Red Team Interview Questions – A Deep Dive Into Red Teaming Essential
Welcome to the Red Team Interview Questions repository! This repository aims to provide a comprehensive list of topics and questions that can be helpful...
Pathfinder : High-Resolution Control-Flow Attacks Exploiting The Conditional Branch Predictor
Researchers delve into the vulnerabilities inherent in Intel's branch prediction algorithms.
Highlighting novel control-flow attacks, the study showcases techniques that leverage the Conditional Branch...
vArmor : Enhancing Container Security In Cloud-Native Environments
vArmor is a cloud-native container sandbox system. It leverages Linux's AppArmor LSM, BPF LSM and Seccomp technologies to implement enforcers.
It can be used to strengthen container isolation, reduce...
DOLOST – Harnessing Cyber Deception For Strategic Security Deployments
Explore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception.
This tool automates the deployment of decoys and deceptive environments, enhancing...