T1036.005 – Masquerading : Match Legitimate Name Or Location
In the cybersecurity landscape, attackers constantly devise methods to bypass security measures.
One sophisticated technique is T1036.005, or Masquerading: Match Legitimate Name or Location,...
X Hacking By Artificial Intelligence : Exploring The Risks Of AI-Enabled Twitter Account Breaches
The advent of 'X Hacking by Artificial Intelligence' marks a significant development. This article explores 'Tweeter,' a tool developed using BlackBox AI designed to...
JEOrg Security Defense Test Drives – Navigating Email Security And Phishing Protection
This comprehensive guide dives into innovative tools and strategies designed to combat phishing and safeguard your digital communication.
From auto-reporting phishing attempts to dissecting...
Sentinel Automation – Streamlining Security Operations With Enhanced Incident Management
This repository provides automation solutions for Microsoft Sentinel. The repository is focused on Logic Apps/Playbooks. The solutions are aimed to:
Enrich Incidents
Perform Incident Response Steps
Create...
XSS-Bypass-Filters : Comprehensive Guide To Attack Techniques And Filter Evasion Strategies
This article dives into the sophisticated realm of Cross-Site Scripting (XSS) attacks, specifically focusing on bypassing security filters that are designed to thwart these...
Shortemall – The Definitive Guide To Advanced URL Scanning
Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike approach URL scanning.
With its...
NativeDump : A Cutting-Edge Approach For Secure Minidump Creation
NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to be parsed by tools...
Xteam Tool – The Ultimate Guide To Mastering Cybersecurity Techniques
A cutting-edge solution designed for cybersecurity enthusiasts and professionals alike. This comprehensive guide explores its multifunctional capabilities, from instant information gathering to advanced penetration...
CVE-2024-3273 Proof Of Concept (PoC) : Unveiling The Vulnerability In D-Link NAS Devices
This repository contains a Proof of Concept (PoC) for CVE-2024-3273, a security vulnerability discovered in D-Link NAS devices.
The vulnerability allows attackers to execute...
Resources For Mobile Application Testing – A Comprehensive Guide To Tools, Techniques, And Vulnerabilities
In the rapidly evolving world of mobile technology, ensuring the security and reliability of applications is paramount.
This comprehensive guide offers an extensive collection...