SeamlessPass: Using Kerberos Tickets to Access Microsoft 365

0
SeamlessPass is a specialized tool designed to leverage on-premises Active Directory Kerberos tickets to obtain access tokens for Microsoft 365 services. This approach is...

JBDev : A Tool For Jailbreak And TrollStore Development

0
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak and TrollStore applications using Xcode. It provides developers with...

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

0
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications that leverage Large Language Models (LLMs). This cutting-edge solution...

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

0
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to escalate privileges and move laterally across networks. These tools...

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

0
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable logic into complex state-driven structures. The ollvm-unflattener tool addresses...

MODeflattener – Miasm’s OLLVM Deflattener

0
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static analysis techniques. Developed using Miasm's intermediate representation capabilities, it...

My Awesome List : Tools And Their Functions

0
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains such as cybersecurity, programming, reverse engineering, and more. Below...

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

0
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on a suite of specialized tools to analyze and weaponize...

Proxmark3 : The Ultimate Tool For RFID Security And Analysis

0
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research, and development. Originally created by Jonathan Westhues in 2007,...

Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation

0
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to obfuscate and encrypt ELF binaries and #!-scripts, providing a...
How to List Users in Linux

How to List Users in Linux

0
Managing users is an essential part of Linux system administration. Knowing how to list all users helps you monitor system access, manage permissions, and...
Nmap Cheat Sheet

Nmap cheat sheet for beginners

0
Nmap (Network Mapper) is a free tool that helps you find devices on a network, discover open ports, and identify services running on those...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...