XC : A Comprehensive Guide To Netcat – Like Reverse Shell For Linux And...
A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems.
With its array of features including file manipulation, port forwarding, and...
linWinPwn – Active Directory Vulnerability Scanner
A versatile bash script designed for automating Active Directory enumeration and vulnerability assessment.
By leveraging a curated selection of tools and employing clever techniques...
WDAC Rule Levels Comparison And Guide – Understanding File Attribute-Based Security Measures
We delve into the hierarchy of WDAC rule levels, ranging from the most secure to the least secure, providing insight into their significance and...
SharpADWS – Red Team’s Secret Weapon For Active Directory Reconnaissance
A groundbreaking tool revolutionizing Active Directory reconnaissance for Red Teams.
By leveraging the obscure Active Directory Web Services (ADWS) protocol, SharpADWS enables discreet data...
MinDNS – A Lightweight Rust-Based DNS Server For Enhanced Network Security
Delve into the realm of network security with MinDNS, a lightweight DNS server crafted in Rust. Designed for versatility, it serves as a formidable...
DarkWidow – A Stealthy Windows Dropper And Post-Exploitation Tool
A formidable tool tailored for both dropper and post-exploitation scenarios on Windows systems.
With its sophisticated capabilities including dynamic syscall invocation, process injection, and...
Cobalt-Strike-Profiles-For-EDR-Evasion + SourcePoint Is A C2 Profile Generator For Cobalt Strike
Bypassing Memory Scanners
The recent versions of Cobalt Strike have made it so easy for the operators to bypass memory scanners like BeaconEye and Hunt-Sleeping-Beacons....
Living Off The LandLeaked Certificates (LoLCerts) – Unveiling The Underworld
Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates.
This threat is becoming more relevant as...
Powershell Digital Forensics And Incident Response (DFIR) – Leveraging Scripts For Effective Cybersecurity
This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices.
The following Incident Response scripts are included:
DFIR Script:...
CVE-2024-20931 – Bypassing Patched Vulnerabilities In Oracle WebLogic
A vulnerability that serves as a bypass for the patched CVE-2023-21839 in Oracle WebLogic.
This article delves into the exploit's mechanics, showcasing its usage...