MEGR-APT is an advanced and scalable system designed for hunting Advanced Persistent Threats (APTs) by identifying suspicious subgraphs that align…
A Proof of Concept (PoC) repository is a valuable tool in the cybersecurity landscape, designed to demonstrate the exploitation of…
The release of YARA-X v0.13.0 introduces several enhancements, bug fixes, and new tools aimed at improving the functionality and user…
CVE-2025-21298 is a critical zero-click vulnerability in Windows Object Linking and Embedding (OLE) technology, which enables embedding and linking to…
The rust-libp2p repository is the central hub for developing the Rust implementation of the libp2p networking stack, a modular and…
Stuxnet, a groundbreaking cyberweapon first discovered in 2010, targeted Iran's nuclear facilities, marking a significant evolution in cyber warfare. It…
SeCoRA (Secure Code Review AI Agent) is an advanced AI-powered tool designed to enhance the security of software codebases by…
Tokei, a powerful and efficient command-line tool, is designed to provide detailed insights into the structure of your codebase. Its…
The Defender-for-Cloud-Apps Toolbox is a robust collection of PowerShell functions designed to streamline and automate the management of Microsoft Cloud…
Web hacking and bug bounty hunting involve identifying vulnerabilities in web applications to enhance their security. This field combines reconnaissance,…