PichichiH0ll0wer : Mastering Nim-Based Process Hollowing For Efficient Payload Management
PichichiH0ll0wer revolutionizes payload management with its Nim-based process hollowing capabilities.
This innovative tool offers configurable features, advanced injection methods, and robust protection mechanisms, making...
ADeleginator – The Key To Detecting Insecure Delegations In Active Directory
ADeleginator emerges as a groundbreaking tool designed to enhance the security landscape of Active Directory environments.
Developed by Spencer Alessi, it meticulously identifies and...
GUIDTool – Mastering Analysis And Prediction Of Version 1 UUIDs
A simple tool to analyse version 1 GUIDs/UUIDs from a system. With the information obtained from analysis, it is often possible to forge future...
Kimsuky PowerShell Backdoor : An In-Depth Breakdown Of Its Command And Control Framework
We delve into the intricate workings of the Kimsuky PowerShell Backdoor, a sophisticated cyber espionage tool attributed to the notorious Kimsuky hacking group.
We...
SharpCovertTube – Covert Command Execution Via YouTube
SharpCovertTube is a program created to control Windows systems remotely by uploading videos to Youtube.
The program monitors a Youtube channel until a video is...
OpenBSD – Dynamic IP, WireGuard VPN, And Encrypted DNS
This article presents a detailed guide centered around OpenBSD and Linux for enhancing network security through the implementation of dynamic IP filtering, WireGuard VPN...
CVE-2024-21762 Check – Identifying Vulnerability In FortiGate SSL VPNs
It provides a detailed guide on how to check if a FortiGate SSL VPN is vulnerable to CVE-2024-21762, a critical security flaw. Utilizing a...
IntelMQ – Boosting Cybersecurity With Automation And Intelligence
IntelMQ is a solution for IT security teams (CERTs & CSIRTs, SOCs abuse departments, etc.) for collecting and processing security feeds (such as log files)...
VMwareCloak – Stealth Mode Enhancement For VM Security To Outsmart Malware
A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analysis. Guaranteed...
BypassAV – Mastering The Art Of Evading Anti-Virus And EDR Systems
In the constantly evolving landscape of cybersecurity, the ability to discreetly navigate past anti-virus (AV) and Endpoint Detection and Response (EDR) systems has become...