Honeypots Detection – Using Nuclei Templates For Effective Detection

0
Nuclei templates for honeypots detection. This repository contains Nuclei templates to detect several well-known open-source honeypots, such as: ADBHoney, Conpot, Cowrie, Dionaea (multiple services), ElasticPot,...

Callstack Spoofing + Indirect Syscalls POC – Unmasking Evasion Techniques In A Proof Of...

0
This project consists of a simple C++ self-Injecting dropper focused on EDR evasion POC. To implement it, I have combined the use of Windows Thread...

GCR – Google Calendar RAT

0
Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is...

Technical Analysis Of BiBi – Windows Wiper Targeting Israeli Organizations

0
On 30th October, Security Joes Incident Response team discovered a new Linux Wiper named "BiBi-Linux" Wiper been deployed by Pro-Hamas Hacktivist group to destroy their infrastructure. And then...

Exploring Tunneling Solutions – A Comprehensive Guide For Self-Hosters And Developers

0
The purpose of this list is to track and compare tunneling solutions. This is primarily targeted toward self-hosters and developers who want to do...

JSpector – Automated JavaScript Analysis In Burp Suite

0
JSpector is a Burp Suite extension that passively crawls JavaScript files and automatically creates issues with URLs, endpoints and dangerous methods found on the...

CloudPulse – AWS Cloud Landscape Search Engine

0
During the reconnaissance phase, an attacker searches for any information about his target to create a profile that will later help him to identify...

PoC For Dumping And Decrypting Cookies In The Latest Version Of Microsoft Teams

0
In the realm of cybersecurity, understanding the intricacies of cookie management and security is paramount. In this article, we delve into a Proof of...

Arsenal – Simplifying Pentesting With Your Ultimate Command Inventory

0
Arsenal is just a quick inventory, reminder and launcher for pentest commands.This project written by pentesters for pentesters simplify the use of all the...

The Future of Work and the Role of Digital Transformation

0
In today's rapidly evolving world, the way we work is undergoing a profound transformation. The digital age has ushered in new paradigms for businesses...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...
mv command

How to Move and Rename Files in Linux with the mv Command

0
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy to relocate or rename items without hassle. Whether organizing...