Atlassian Companion RCE Vulnerability Proof of Concept (CVE-2023-22524)
Atlassian Companion for macOS has a serious remote code execution vulnerability that was just found. It is called CVE-2023-22524. This flaw is a major...
ADOKit: Azure DevOps Services Attack Toolkit
Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by taking advantage of the...
CreateToken: Exploiting ZwCreateToken() for SYSTEM Token
In the realm of cybersecurity, understanding and exploiting Windows APIs is pivotal for both defenders and attackers. In this article, we delve into the...
LDAP Nom Nom: Insane-Speed Active Directory User Enumeration via LDAP Ping Exploitation
With the help of LDAP Ping requests (cLDAP), "LDAP Nom Nom" is a powerful tool that quickly and quietly brute-forces Active Directory usernames. This...
Mastering YARA: A Comprehensive Guide to Detection Engineering and Rule Development
Threat identification and analysis are very important for keeping systems and networks safe in the ever-changing world of cybersecurity. YARA is an open-source tool...
Photo Location Finder: Using Google Cloud Vision API to Detect Landmarks and Labels in...
This is a Python code to detect landmarks, labels and web entities in a set of images using Google Cloud Vision API. The code...
APIDetector: Uncovering Swagger Endpoint Risks and How to Secure Your API
APIDetector is a powerful and efficient tool designed for testing exposed Swagger endpoints in various subdomains with unique smart capabilities to detect false-positives. It's...
Telegram Nearby Map: How to Find Nearby Users and Their Approximate Locations
Have you ever wondered if you could find Telegram users close and get a sense of where they are? You can with Telegram Nearby...
PacketSpy: A Powerful Network Packet Sniffing Tool for Analyzing Network Traffic
PacketSpy is a powerful network packet sniffing tool designed to capture and analyze network traffic. It provides a comprehensive set of features for inspecting...
Nim-Shell: The Hidden Dangers and Importance of Cybersecurity
Cybersecurity is more important than ever in today's digitally connected world. As technology improves, so do the ways that bad people break into systems...