Awesome Cybersecurity Handbooks – A Comprehensive Guide And Resource Repository

0
A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are living documents and I...

WolfPack – Scaling Red Team Redirectors

0
WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale. This tool enables security professionals to efficiently scale...

Cameradar – Your Comprehensive Guide To RTSP Stream Access And Security

0
In the age of digital surveillance and connectivity, access to RTSP (Real-Time Streaming Protocol) streams plays a pivotal role in both security and exploration....

Elitewolf – Critical Infrastructure Security Insights

0
This repository contains various ICS/SCADA/OT focused signatures and analytics. The end goal is to enable Critical Infrastructure Defenders, Intrusion Analysts, and others to implement...

SubCat – A Fast And Efficient Subdomain Enumeration Tool

0
SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is...

CVE-2023-22515 Scanner – Detecting Atlassian Confluence Vulnerability

0
This is simple scanner for CVE-2023-22515, a critical vulnerability in Atlassian Confluence Data Center and Server that is actively being exploited in the wild by...

Msprobe – On-Prem Microsoft Solutions Discovery For Security

0
Discovering and securing on-premises Microsoft solutions is paramount in today's cybersecurity landscape. In this article, we delve into 'msprobe,' a powerful tool designed to...

Aftermath – Swift-Powered Incident Response And Data Analysis

0
Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently analyze the data from the...

Dangerzone – Safely Convert Risky Documents Into Secure PDFs

0
Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF. Dangerzone works like this: You give it a...

CVE-2023-36723 – Windows Sandbox Directory Creation Vulnerability

0
This is PoC for arbitrary directory creation bug in Container Manager service. This PoC is not thoroughly tested so it may not even work most...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...
mv command

How to Move and Rename Files in Linux with the mv Command

0
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy to relocate or rename items without hassle. Whether organizing...
mkdir

How to Create Directories in Linux with the mkdir Command

0
Creating directories is one of the earliest skills you'll use on a Linux system. The mkdir (make directory) command provides a straightforward way to organize your...