Vulnerability Analysis

ELF Loader And PS5-JAR-Loader : Tools For Enhanced Functionality

In the realm of PlayStation 5 (PS5) development, two significant tools have emerged to enhance the console's capabilities: the ELF…

2 weeks ago

WebHunt : A Dive Into Web App Testing For Bug Bounty Hunting

WebHunt is an innovative project that focuses on web application testing, particularly for bug bounty hunting. It leverages powerful tools…

2 weeks ago

Process Ghosting In Rust : Crafting Evasive Applications On Windows

Process ghosting is a sophisticated technique used to evade detection by security tools on Windows systems. It involves creating a…

2 weeks ago

eWPTX Preparion : Essential Tools And Functions

The eWPTX (eLearnSecurity Web Application Penetration Tester Extreme) certification is a challenging credential that validates an individual's advanced skills in…

2 weeks ago

CPUMicrocodes : A Gateway To Advanced CPU Microcode Management And Optimization

CPUMicrocodes is a comprehensive repository of microcodes for Intel, AMD, VIA, and Freescale CPUs. Microcode is a low-level firmware that…

2 weeks ago

2025-03-04 (Tuesday) : Group Claiming To Be BianLian Sends Paper-Based Extortion Letters via Postal Service

On March 4, 2025, a group claiming to be the notorious threat actor BianLian began sending paper-based extortion letters to…

2 weeks ago

DE-TH-Aura : Detection Engineering And Threat Hunting By SecurityAura

DE-TH-Aura, an initiative by SecurityAura, focuses on enhancing detection engineering and threat hunting capabilities using KQL (Kusto Query Language). This…

2 weeks ago

XenonRecomp : A Tool For Recompiling Xbox 360 Executables

XenonRecomp is a powerful tool designed to convert Xbox 360 executables into C++ code, allowing these executables to be recompiled…

3 weeks ago

Tools Function In Research Publications: Enhancing Firmware Security And Performance

Research publications often introduce innovative tools and methodologies to address complex challenges in technology and cybersecurity. Two notable examples—Near-Native Rehosting…

3 weeks ago

Program Exposes Unsound And Incomplete Behavior In Compiler

The provided program highlights critical issues within the compiler, exposing both soundness and completeness violations. These bugs manifest in unexpected…

3 weeks ago