BrowserStealer (Chrome / Firefox / Microsoft Edge)- Unveiling Password And Data Theft In Browsers
A comprehensive exploration of a powerful software tool designed to extract passwords, cookies, history, and bookmarks from popular web browsers.
In this article, we...
Microsoft Defender For Endpoint Curated List Of Resources For DFIR – Microsoft Defender For...
Hey, thank you stopping by! Well, being here means that you are either familiar with the discipline of Digital Forensics and Incident Reponse (DFIR)...
WebCopilot – A Comprehensive Subdomain Enumeration And Bug Detection Tool
WebCopilot is an automation tool designed to enumerate subdomains of the target and detect bugs using different open-source tools.
The script first enumerate all the subdomains...
Frown – An Instrumentation Challenge : Navigating The Setup And Solutions
In the world of cybersecurity and ethical hacking, challenges often serve as valuable training grounds for aspiring professionals.
"Frown – An Instrumentation Challenge" is...
Linux Kernel CVE-2023-6546 : Unveiling A Critical Vulnerability
This is a custom exploit which targets Ubuntu 18.04+20.04 LTS/Centos 8/RHEL 8 to attain root privileges via arbitrary kernel code execution on SMP systems.
Features
Highlights...
GraphStrike – Empowering Cobalt Strike With Microsoft Graph API Integration
GraphStrike is a suite of tools that enables Cobalt Strike's HTTPS Beacon to use Microsoft Graph API for C2 communications. All Beacon traffic will be transmitted...
AI Exploits – Vulnerabilities And Threats In Machine Learning Infrastructure
The AI world has a security problem and it's not just in the inputs given to LLMs such as ChatGPT. Based on research done...
EchoDrv – Unveiling Kernel Vulnerabilities In ECHOAC Anti-Cheat Driver echo_driver.sys
In the realm of cybersecurity, the relentless battle between attackers and defenders rages on. Enter EchoDrv, a potent tool that exposes the vulnerabilities lurking...
Ghost – Unmasking The Intricacies Of A Remote Access Trojan
Ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the...
LOLSpoof – A Clever Technique To Evade Command Line Detection And Maintain OPSEC
LOLSpoof is a an interactive shell program that automatically spoof the command line arguments of the spawned process. Just call your incriminate-looking command line...