Capa v7.3.0 – Enhanced Malware Analysis With VMRay Integration, Ghidra Support, And New Capa...

0
The v7.3.0 capa release comes with the following three major enhancements: 1. Support For VMRay Sandbox Analysis Archives Unlock powerful malware analysis with capa's new VMRay...

MSSprinkler – Enhancing M365 Security Through Advanced Password Testing

0
MSSprinkler is a password spraying utility for organizations to test their M365 accounts from an external perspective. It employs a 'low-and-slow' approach to avoid...

Inception – A Deep Dive Into PCI-Based DMA Memory Hacking

0
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any...

DeadPotato – Harnessing Advanced System Tools For Security And Administration

0
The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new capabilities like domain data collection...

AdbNet – Mastering Android Device Exploitation

0
A sophisticated tool designed for exploiting vulnerabilities in Android devices. This article dives into the features of AdbNet, offering a detailed guide on how...

File Tunnel – Innovative TCP Connection Tunneling via Files

0
A powerful tool designed to tunnel TCP connections through a file. Ideal for circumventing firewalls and establishing secure network links, File Tunnel leverages shared...

Tartufo API – Configuration, Rules, And Scanning Capabilities

0
Dive into the world of Tartufo, a powerful tool designed for scanning and managing security vulnerabilities through regular expressions. This article offers a comprehensive...

Would You Like To Know More In Tartufo – Cleaning Up Git Repositories Of...

0
If the other documentation left you wondering what to do with the results of your scans, and unsure how to get rid of those...

Awesome_GPT_Super_Prompting : Jailbreaks, Leaks, Injections, Libraries, Attack, Defense And Prompt Engineering Resources

0
A comprehensive guide exploring the nuances of GPT jailbreaks, prompt injections, and AI security. This article unpacks an arsenal of resources for both attack...

NamedPipeMaster – A Comprehensive Toolkit For Named Pipe Analysis And Interaction

0
NamedPipeMaster is a versatile tool for analyzing and monitoring in named pipes. It includes Ring3NamedPipeConsumer for direct server interaction, Ring3NamedPipeMonitor for DLL-based API hooking...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...