Tweet-Machine : Hidden Twitter Histories With Advanced OSINT Capabilities
Tweet-Machine is an Open-Source Intelligence (OSINT) tool designed to retrieve deleted tweets and replies from any Twitter user, even if their account has been...
2025-03-04 (Tuesday) : Group Claiming To Be BianLian Sends Paper-Based Extortion Letters via Postal...
On March 4, 2025, a group claiming to be the notorious threat actor BianLian began sending paper-based extortion letters to executives at U.S.-based organizations....
Blindsight : Advanced Techniques In Red Teaming And LSASS Memory Exploitation
Blindsight is a red teaming tool designed to dump LSASS (Local Security Authority Subsystem Service) memory on Windows systems, bypassing basic countermeasures.
It utilizes...
PowerShell-Hunter : A Comprehensive Toolset For Threat Hunting
PowerShell-Hunter is a robust collection of PowerShell-based tools designed to aid security analysts in detecting and investigating malicious activities within Windows environments.
This project...
DE-TH-Aura : Detection Engineering And Threat Hunting By SecurityAura
DE-TH-Aura, an initiative by SecurityAura, focuses on enhancing detection engineering and threat hunting capabilities using KQL (Kusto Query Language).
This effort is primarily aimed...
MassVulScan : A Comprehensive Network Scanning Tool
MassVulScan is a powerful network scanning tool designed for pentesters and system administrators to identify open ports and potential security vulnerabilities across large-scale networks....
The-XSS-Rat : A Comprehensive Guide To Cross-Site Scripting Tools And Strategies
The-XSS-Rat, an experienced ethical hacker, provides valuable insights into the world of cross-site scripting (XSS) through comprehensive guides and strategies.
This article will delve...
NimPlant C2 : A Position Independent Code (PIC) Beacon
NimPlant C2 is a minimal Proof-of-Concept (PoC) beacon written in C, designed to operate as truly Position Independent Code (PIC) without relying on reflective...
Tools Function In Research Publications: Enhancing Firmware Security And Performance
Research publications often introduce innovative tools and methodologies to address complex challenges in technology and cybersecurity.
Two notable examples—Near-Native Rehosting for Embedded ARM Firmware...
Solana Smart Contract Security Best Practices: Essential Tools And Functions
Ensuring the security of Solana smart contracts is crucial to prevent exploits and maintain the integrity of blockchain applications. The Solana ecosystem provides several...