VTI-Dorks – Mastering Threat Hunting With VirusTotal Queries
Awesome VirusTotal Enterprise Search Queries (formerly Virustotal Intelligence or VTI). In today's evolving cyber landscape, effective threat hunting is paramount.
'VTI-Dorks: Mastering Threat Hunting...
CloudGrep – Efficient Direct Search For Logs In Cloud Storage
The innovative solution designed to streamline your search processes in cloud storage. By bypassing traditional log indexing in SIEMs, CloudGrep offers a faster, cost-effective...
ChopChop – Web Security Testing Tool
ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT.
Its goal is to scan several endpoints...
CVE-2023-43770 POC – Unveiling XSS Vulnerability In Roundcube
In the dynamic realm of cybersecurity, vulnerabilities emerge and evolve constantly. The recent discovery of CVE-2023-43770 highlights an alarming Cross-Site Scripting (XSS) flaw in...
Building And Configuring – Kernel Exploits On Ubuntu 23.04
In the rapidly evolving landscape of Linux systems, vulnerabilities can emerge that challenge even seasoned developers.
'Building and Configuring: Kernel Exploits on Ubuntu 23.04'...
Nightmangle – Cyber Espionage via Telegram’s C2 Agent ExploredNightmangle
Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent, created by @1N73LL1G3NC3.
It was developed as Proof of Concept (POC), that Telegram API can be used...
Script Overview – Decoding GootLoader Payloads And Obfuscations
In the intricate realm of cyber threats, GootLoader emerges as a formidable challenge. This article delves deep into the intricacies of decoding its payloads...
Wireshark 4.0.10 Released – What’s New!
The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol development, network monitoring, communications...
ELFEN – Linux Malware Analysis Sandbox
ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform both static and dynamic...
Incident Response Playbooks – Streamlined Security Mitigation Guides
Welcome to the Incident Response Playbooks repository! We're creating these playbooks with the knowledge gained from LetsDefend to assist security experts in responding to various security...