Unwyze – A Wyze Cam v3 RCE Exploit

0
I worked on auditing the Wyze Cam V3 firmware as part of entering this year Pwn2Own 2023 Toronto competition. My entry came along nicely and I...

SharpKiller – A Deep Dive Into Bypassing AMSI For Enhanced PowerShell Capabilities

0
Explore the cutting-edge world of PowerShell evasion with 'SharpKiller.' In this deep dive, we unravel the inner workings of this tool, designed to bypass...

Facad1ng – The Ultimate URL Masking Tool For Phishing Prevention

0
In the ever-evolving landscape of online security, phishing attacks continue to pose a significant threat. To combat this menace, meet Facad1ng – the ultimate...

NINJA HACKER ACADEMY – Unveiling The Ultimate Cybersecurity Training Challenge

0
In the world of cybersecurity, where the battle between hackers and defenders rages on, there exists a clandestine training ground known as NINJA HACKER...

The Panthera(P.)uncia of Cybersecurity

0
In the ever-evolving landscape of cybersecurity, the hunt for vulnerabilities and exploits has a new apex predator: Puncia. This formidable tool, powered by advanced...

GATOR – A Comprehensive GCP Attack Toolkit For Offensive Research

0
GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments. It offers a comprehensive range of...

SecuSphere – Revolutionizing DevSecOps For Secure Software Development

0
Welcome to SecuSphere, your one-stop solution for all DevSecOps needs. Our centralized platform is expertly designed to manage and optimize your vulnerability management, CI/CD...

BChecks : Unlocking The Power Of Burp Suite Professional – A Comprehensive Guide

0
Burp Suite Professional BChecks developed both by PortSwigger and the community. In the realm of cybersecurity and web application testing, Burp Suite Professional stands...

Offensive Lua – Unveiling Lua Scripts For Windows Security Exploration

0
Offensive Lua is a collection of offensive security scripts written in Lua with FFI. The scripts run with LuaJIT (v2.0.5) on Microsoft Windows to...

Sshimpanzee – Unleashing Advanced Reverse SSH Tunnels For Security Professionals

0
Sshimpanzee allows you to build a static reverse ssh server. Instead of listening on a port and waiting for connections, the ssh server will initiate a reverse connect...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...
mv command

How to Move and Rename Files in Linux with the mv Command

0
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy to relocate or rename items without hassle. Whether organizing...
mkdir

How to Create Directories in Linux with the mkdir Command

0
Creating directories is one of the earliest skills you'll use on a Linux system. The mkdir (make directory) command provides a straightforward way to organize your...