VTI-Dorks – Mastering Threat Hunting With VirusTotal Queries

0
Awesome VirusTotal Enterprise Search Queries (formerly Virustotal Intelligence or VTI). In today's evolving cyber landscape, effective threat hunting is paramount. 'VTI-Dorks: Mastering Threat Hunting...

CloudGrep – Efficient Direct Search For Logs In Cloud Storage

0
The innovative solution designed to streamline your search processes in cloud storage. By bypassing traditional log indexing in SIEMs, CloudGrep offers a faster, cost-effective...

ChopChop – Web Security Testing Tool

0
ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT. Its goal is to scan several endpoints...

CVE-2023-43770 POC – Unveiling XSS Vulnerability In Roundcube

0
In the dynamic realm of cybersecurity, vulnerabilities emerge and evolve constantly. The recent discovery of CVE-2023-43770 highlights an alarming Cross-Site Scripting (XSS) flaw in...

Building And Configuring – Kernel Exploits On Ubuntu 23.04

0
In the rapidly evolving landscape of Linux systems, vulnerabilities can emerge that challenge even seasoned developers. 'Building and Configuring: Kernel Exploits on Ubuntu 23.04'...

Nightmangle – Cyber Espionage via Telegram’s C2 Agent ExploredNightmangle

0
Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent, created by @1N73LL1G3NC3. It was developed as Proof of Concept (POC), that Telegram API can be used...

Script Overview – Decoding GootLoader Payloads And Obfuscations

0
In the intricate realm of cyber threats, GootLoader emerges as a formidable challenge. This article delves deep into the intricacies of decoding its payloads...

Wireshark 4.0.10 Released – What’s New!

0
The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol development, network monitoring, communications...

ELFEN – Linux Malware Analysis Sandbox

0
ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform both static and dynamic...

Incident Response Playbooks – Streamlined Security Mitigation Guides

0
Welcome to the Incident Response Playbooks repository! We're creating these playbooks with the knowledge gained from LetsDefend to assist security experts in responding to various security...
lyric video maker

The Code Behind Lyric Video Makers: Rendering and Timing

0
Lyric videos have become one of the most popular tools for artists to share music online. They’re creative, affordable, and help listeners connect more...
cp command

cp Command: Copy Files and Directories in Linux

0
The cp command, short for "copy," is the main Linux utility for duplicating files and directories. Whether making a backup, organizing a project, or moving content, cp allows...
image osint

Image OSINT

0
Introduction In digital investigations, images often hold more information than meets the eye. With the right tools and techniques, analysts can uncover hidden metadata, find...
cat Command

cat Command: Read and Combine File Contents in Linux

0
The cat command short for concatenate, It is a fast and versatile tool for viewing and merging file contents directly from the Linux terminal. Whether you're...
ports in networking

Port In Networking

0
What is a Port? A port in networking acts like a gateway that directs data to the right program on a device. An IP address...