Hacking Tools

Sysdig Inspect – A Comprehensive Guide To Container Troubleshooting And SecuritSysdig Inspect – A Comprehensive Guide To Container Troubleshooting And Securit

Sysdig Inspect – A Comprehensive Guide To Container Troubleshooting And Securit

Sysdig Inspect is a powerful opensource interface for container troubleshooting and security investigation Inspect's user interface is designed to intuitively navigate…

7 months ago
Checking The Installation – A Guide To Installing And Verifying TartufChecking The Installation – A Guide To Installing And Verifying Tartuf

Checking The Installation – A Guide To Installing And Verifying Tartuf

You can install tartufo in the usual ways you would for a Python Package, or using docker to pull the latest tartufo docker image from Docker…

7 months ago
CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 VulnerabilityCVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…

7 months ago
TrickDump – Evading Detection With Advanced Memory Dump TechniquesTrickDump – Evading Detection With Advanced Memory Dump Techniques

TrickDump – Evading Detection With Advanced Memory Dump Techniques

TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…

7 months ago
Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And ResourcesRed-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources

Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources

This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…

7 months ago
SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTPSCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…

7 months ago
Nipe – Pioneering Privacy And Anonymity On The Internet With TorNipe – Pioneering Privacy And Anonymity On The Internet With Tor

Nipe – Pioneering Privacy And Anonymity On The Internet With Tor

The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…

7 months ago
Themida-Unmutate : Mastering Deobfuscation Of Protected SoftwareThemida-Unmutate : Mastering Deobfuscation Of Protected Software

Themida-Unmutate : Mastering Deobfuscation Of Protected Software

A Python 3 tool to statically deobfuscate functions protected by Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.The tool has…

7 months ago
Hackberry-Pi_Zero : The Ultimate Handheld Linux Terminal For Makers And HackersHackberry-Pi_Zero : The Ultimate Handheld Linux Terminal For Makers And Hackers

Hackberry-Pi_Zero : The Ultimate Handheld Linux Terminal For Makers And Hackers

A handheld Linux terminal using Raspberry pi Zero 2W as Core with 4" 720X720 TFT display and the original BlackBerry…

7 months ago
SecretMagpie – The Comprehensive Secret Detection Tool For Your RepositoriesSecretMagpie – The Comprehensive Secret Detection Tool For Your Repositories

SecretMagpie – The Comprehensive Secret Detection Tool For Your Repositories

Organisations struggle to scan for leaked secrets in ALL of their repos. It's easy to scan one repo, but time…

7 months ago