Osquery-Defense-Kit : Enhancing Cybersecurity

0
Osquery queries for Detection & Incident Response, containing 250+ production-ready queries. ODK (osquery-defense-kit) is unique in that the queries are designed to be used as...

Coerced Potato Reflective DLL – Unveiling Privilege Escalation From NT Service To SYSTEM

0
Privilege escalation from NT Service to SYSTEM using SeImpersonateToken privilege and MS-RPRN functions. Heavily based Reflective Loader from Install Clone this repo and compile the project in VisualStudio...

InfoSec Black Friday Deals – “Friday Hack Fest” 2023 Edition

0
All the deals for InfoSec related software/tools this Black Friday / Cyber Monday. Researcher was a little late getting started with my wife pushing out...

eBPF Tools: Revolutionizing System Monitoring with Advanced PTY Sniffing Techniques

0
This piece talks about eBPF tools and shows how they can be used to improve system monitoring by keeping track of PTY sessions and...

Dynmx Prototype: An Advanced API Call Trace Analysis Tool for Malware Detection

0
dynmx (spoken dynamics) is a signature-based detection approach for behavioural malware features based on Windows API call sequences. In a simplified way, you can think of dynmx as...

Karton-Pcap-Miner: Streamlining Network Indicator Extraction from PCAPs

0
Karton-Pcap-Miner is a strong program that quickly pulls network indicators from analysis PCAP files." It works with MWDB without any problems to add these...

Crawlector – Empowering Threat-Hunting With Advanced Web Scanning And Detection

0
Crawlector (the name Crawlector is a combination of Crawler & Detector) is a threat-hunting framework designed for scanning websites for malicious objects. Note-1: The framework was first presented...

31 Tips from Inon Shkedy’s Challenge – Mastering API Security

0
This challenge is Inon Shkedy's 31 days API Security Tips -API TIP: 1/31- Older APIs versions tend to be more vulnerable and they lack security mechanisms....

InfoSec Black Friday Deals – “Friday Hack Fest” 2023 Edition

0
All the deals for InfoSec related software/tools this Black Friday / Cyber Monday. Just 2023 Things Quality over quantity - this list goes through a level...

Hades Command And Control – Learning Malware Development and CTFsHades Command & Control

0
Hades is a basic Command & Control server built using Python. It is currently extremely bare bones, but I plan to add more features...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...
mv command

How to Move and Rename Files in Linux with the mv Command

0
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy to relocate or rename items without hassle. Whether organizing...