Advertisement

py-amsi: Streamlining Malware Detection in Python with the Windows AMSI API

0
py-amsi is a library that scans strings or files for malware using the Windows Antimalware Scan Interface (AMSI) API. AMSI is an interface native...

Elevation Station: Mastering Privilege Escalation with Advanced Token Manipulation Techniques

0
ElevationStation is a privilege escalation tool. It works by borrowing from commonly used escalation techniques involving manipulating/duplicating process and thread tokens. Why reinvent the wheel...

Enhancing macOS Security: A Guide to Red Canary Mac Monitor

0
Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research, malware triage, and system troubleshooting. Harnessing Apple Endpoint Security...

Afuzz – An automated web path fuzzing tool

0
Finding security holes is a lot like finding hidden treasures in the world of bug bounty hunts. "Afuzz" turns out to be a useful...

PassBreaker: A Comprehensive Guide to Advanced Password Cracking Techniques

0
Even though cybersecurity is always changing, cracking passwords is still an important skill for security workers to have. "PassBreaker," a command-line password cracking tool...

NimExec: Fileless Command Execution via MS-SCMR

0
Basically, NimExec is a fileless remote command execution tool that uses The Service Control Manager Remote Protocol (MS-SCMR). It changes the binary path of...

NetAtlas C2 Server Search: Detecting Command and Control Servers with Netlas API

0
C2 Search Netlas is a Java utility designed to detect Command and Control (C2) servers using the Netlas API. It provides a straightforward and...

Porch Pirate: A Comprehensive Reconnaissance and OSINT Framework for Postman

0
Porch Pirate started as a tool to quickly uncover Postman secrets, and has slowly begun to evolve into a multi-purpose reconaissance / OSINT framework...

DrawNmap: Revolutionizing Network Analysis with Python-Based Visualization of Nmap Scan Results

0
Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML. Los nodos representan cada...

All-in-One Bug Hunting Setup: The Ultimate Debian Linux Script for Cybersecurity Enthusiasts

0
In the always-changing world of cybersecurity, it's important to be quick and careful. For Debian Linux users who are really into finding and studying...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...
mv command

How to Move and Rename Files in Linux with the mv Command

0
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy to relocate or rename items without hassle. Whether organizing...