TrickDump – Evading Detection With Advanced Memory Dump Techniques

0
TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the memory region dumps. In...

Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources

0
This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and enthusiasts. Whether you're a...

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

0
SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs, patches, script deployments, etc....

Nipe – Pioneering Privacy And Anonymity On The Internet With Tor

0
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It is used by a...

Themida-Unmutate : Mastering Deobfuscation Of Protected Software

0
A Python 3 tool to statically deobfuscate functions protected by Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.The tool has been tested on Themida up...

Hackberry-Pi_Zero : The Ultimate Handheld Linux Terminal For Makers And Hackers

0
A handheld Linux terminal using Raspberry pi Zero 2W as Core with 4" 720X720 TFT display and the original BlackBerry Keyboard. The main reason why...

SecretMagpie – The Comprehensive Secret Detection Tool For Your Repositories

0
Organisations struggle to scan for leaked secrets in ALL of their repos. It's easy to scan one repo, but time consuming and tedious to...

Firefly : Revolutionizing Security Testing With Advanced Black-Box Fuzzing

0
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing a target with a...

Flipper – Your Ultimate Guide To Resources, Codes, And Community Support

0
The vibrant world of Flipper Zero, a playground where innovation meets utility. This article is your gateway to exploring the extensive resources available for...

Adding A Hardware Profile : A Step-by-Step Tutorial For System Configuration

0
If you need to add new hardware you have to follow the following process: Create a hardware profile {name}.yaml file and name it as you...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...