v1.0.0 – Elevating Cybersecurity And System Management Capabilities
The latest v1.0.0 release marks a significant advancement in cybersecurity and system management tools, introducing a host of new features and improvements.
With enhancements...
Abusing Family Refresh Tokens For Unauthorized Access And Persistence In Azure Active Directory
In the evolving landscape of cloud security, a novel vulnerability within Azure Active Directory (Azure AD) exposes a critical risk to organizational assets.
This...
Lucid – Revolutionizing Fuzzing Through Bochs Emulation Technology
Lucid is an educational fuzzing project which aims to create a Bochs emulator based snapshot fuzzer capable of fuzzing traditionally hard to fuzz targets...
CVE-2024-25600_Nuclei-Template : Unveiling Remote Code Execution In WordPress’s Bricks Plugin
In the digital landscape of WordPress themes and plugins, a critical vulnerability has emerged with the potential to compromise website security.
CVE-2024-25600, a flaw...
Nmap Analysis Tool – Enhancing Network Security Through Advanced Analysis And Reporting
This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap...
ADeleg – Mastering Active Directory Delegation Management
Is an Active Directory delegation management tool. It allows you to make a detailed inventory of delegations set up so far in a forest,...
SSH-Snake : Automated SSH-Based Network Traversal
SSH-Snake is a powerful tool designed to perform automatic network traversal using SSH private keys discovered on systems, with the objective of creating a...
Mr.Handler – The Ultimate Tool For Linux Security Incident Response And System Analysis
MR.Handler is a specialized tool designed for responding to security incidents on Linux systems.
It connects to target systems via SSH to execute a...
SwaggerSpy – Elevating API Security Through OSINT On SwaggerHub
SwaggerSpy is a tool designed for automated Open Source Intelligence (OSINT) on SwaggerHub.
This project aims to streamline the process of gathering intelligence from...
UAC-BOF-Bonanza : Elevating Access With Advanced Bypass Methods
This repository serves as a collection of public UAC bypass techniques that have been weaponized as BOFs. A single module which integrates all techniques...