Advertisement

Azure Outlook C2 – Unveiling Remote Control Of Windows Devices Via Outlook Mailbox

0
Azure Outlook Command And Control that uses Microsoft Graph API for C2 communications And data exfiltration. The intriguing world of 'Azure Outlook C2,' a...

CsWhispers – Supercharge Your C# Project With D/Invoke And Indirect Syscalls

0
Source generator to add D/Invoke and indirect syscall methods to a C# project. A game-changer for C# developers, CsWhispers is a source generator that...

XLL Dropper – Mastering A Red Team’s Ultimate Weapon

0
Write XLL Dropper in c++ , a red teams most used dropper , learn how to be like a red teams and APT groups...

ExecIT – Unveiling A Fileless Execution Technique Ith Undetectable DLL Shellcode

0
DLL Shellcode self-inyector/runner based on HWSyscalls, ideally thought to be executed with rundll32. May grant fileless execution if victim endpoint has access to attacker-controlled...

Awesome GPTs (Agents) For Cybersecurity – The Ultimate Guide

0
The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity (offensive and defensive), created...

VPS-Bug-Bounty-Tools : Automating Web Security Tools Installation

0
Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty. Usage: cd /tmp && git clone https://github.com/drak3hft7/VPS-Bug-Bounty-Tools cd VPS-Bug-Bounty-Tools sudo...

Stardust – A Deep Dive Into A 64-Bit Position Independent Implant Template

0
An modern 64-bit position independent implant template. raw strings global instance compile time hashing #include <Common.h> #include <Constexpr.h> FUNC VOID Main( _In_ PVOID Param ) { ...

Automated Emulation – Building A Customizable Breach And Attack Simulation Lab With AWS And...

0
Automated Emulation is a simple terraform template creating a customizable and automated Breach and Attack Simulation lab. It automically builds the following resources hosted...

CVE-2023-22527 in Confluence : A Step-by-Step Guide And Its Implications

0
In the world of cybersecurity, staying informed about the latest vulnerabilities is crucial. One such vulnerability that has garnered attention is CVE-2023-22527 in Confluence,...

YaraDbg – Simplifying Yara Rule Development And Analysis For Security Analysts

0
YaraDbg is a free web-based Yara debugger to help security analysts to write hunting or detection rules with less effort and more confidence. By...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...
mv command

How to Move and Rename Files in Linux with the mv Command

0
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy to relocate or rename items without hassle. Whether organizing...