TrickDump – Evading Detection With Advanced Memory Dump Techniques
TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the memory region dumps. In...
Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources
This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and enthusiasts.
Whether you're a...
SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP
SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs, patches, script deployments, etc....
Nipe – Pioneering Privacy And Anonymity On The Internet With Tor
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism.
It is used by a...
Themida-Unmutate : Mastering Deobfuscation Of Protected Software
A Python 3 tool to statically deobfuscate functions protected by Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.The tool has been tested on Themida up...
Hackberry-Pi_Zero : The Ultimate Handheld Linux Terminal For Makers And Hackers
A handheld Linux terminal using Raspberry pi Zero 2W as Core with 4" 720X720 TFT display and the original BlackBerry Keyboard.
The main reason why...
SecretMagpie – The Comprehensive Secret Detection Tool For Your Repositories
Organisations struggle to scan for leaked secrets in ALL of their repos. It's easy to scan one repo, but time consuming and tedious to...
Firefly : Revolutionizing Security Testing With Advanced Black-Box Fuzzing
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing a target with a...
Flipper – Your Ultimate Guide To Resources, Codes, And Community Support
The vibrant world of Flipper Zero, a playground where innovation meets utility. This article is your gateway to exploring the extensive resources available for...
Adding A Hardware Profile : A Step-by-Step Tutorial For System Configuration
If you need to add new hardware you have to follow the following process:
Create a hardware profile {name}.yaml file and name it as you...