DLL Universal Patcher – A Comprehensive Guide To Advanced Binary Patching

0
DLL Universal Patcher is a flexible and convenient code patcher that doesn't touch the files on disk. It can be used for replacing any...

SharpExclusionFinder – Streamlining Windows Defender Exclusion Checks With Advanced Scanning Capabilities

0
This C# program finds Windows Defender folder exclusions using Windows Defender through its command-line tool (MpCmdRun.exe). The program processes directories recursively, with configurable depth...

SlackEnum – Mastering User Enumeration On Slack

0
A specialized tool designed for user enumeration on the Slack platform. This powerful utility aids in identifying active users within a Slack workspace, enhancing...

SharpTerminator – A Guide To Automating AV/EDR Disruption With C# Port

0
C# port of ZeroMemoryEx's Terminator, so all hail goes to him. Usage You can download the driver from a remote URL using SharpTerminator and load it...

OXO Scan Orchestration Engine – A Comprehensive Guide To Scalable Security Assessments

0
OXO is a security scanning framework built for modularity, scalability and simplicity. OXO Engine combines specialized tools to work cohesively to find vulnerabilities and perform...

MANSPIDER – Advanced SMB Crawling For Sensitive Data Detection

0
textract, one of manspider's upstream dependencies, is no longer being updated. For this reason, you may run into problems when installing with pip. The...

EDR-Antivirus-Bypass-To-Gain-Shell-Access

0
This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique. The code executes shellcode that spawns a...

GShark – A Comprehensive Guide To Sensitive Information Management System Deployment

0
The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please refer to...

zDocker-cobaltstrike : A Comprehensive Guide To Setting Up Cobalt Strike With Docker

0
A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be seamlessly integrated...

ConfuserEx2 String Decryptor – A Guide To Deobfuscating .NET Applications

0
ConfuserEx2 is the latest version from the Confuser family → An open-source, free protector for .NET applications. ConfuserEx2_String_Decryptor deobfuscates constants protection, targeting string objects and...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...