We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…
TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…
This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…
SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…
A Python 3 tool to statically deobfuscate functions protected by Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.The tool has…
A handheld Linux terminal using Raspberry pi Zero 2W as Core with 4" 720X720 TFT display and the original BlackBerry…
Organisations struggle to scan for leaked secrets in ALL of their repos. It's easy to scan one repo, but time…
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing…
The vibrant world of Flipper Zero, a playground where innovation meets utility. This article is your gateway to exploring the…