CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

0
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like NVD and MITRE are valuable, but relying on them directly...

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

0
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to practice vulnerability detection and exploitation in a controlled environment....

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

0
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable logic into complex state-driven structures. The ollvm-unflattener tool addresses...

Cybersecurity – Tools And Their Function

0
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious threats. These tools are designed to address specific security...

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

0
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary code by exploiting improper side-effect modeling in TurboFan’s JSCreateObject...

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

0
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides foundational insights into browser internals and tools critical for...

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

0
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on a suite of specialized tools to analyze and weaponize...

Awesome Solana Security : Enhancing Program Development

0
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more secure Solana programs. It provides a wide range of...

IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

0
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting the NGINX Ingress Controller for Kubernetes. These vulnerabilities, including...

Endpoint With Missing Agents : Identifying And Managing Security Gaps

0
Endpoint security is crucial for protecting organizations from cyber threats. However, managing endpoint agents can be challenging, especially when devices are missing critical security...
cp command

cp Command: Copy Files and Directories in Linux

0
The cp command, short for "copy," is the main Linux utility for duplicating files and directories. Whether making a backup, organizing a project, or moving content, cp allows...
image osint

Image OSINT

0
Introduction In digital investigations, images often hold more information than meets the eye. With the right tools and techniques, analysts can uncover hidden metadata, find...
cat Command

cat Command: Read and Combine File Contents in Linux

0
The cat command short for concatenate, It is a fast and versatile tool for viewing and merging file contents directly from the Linux terminal. Whether you're...
ports in networking

Port In Networking

0
What is a Port? A port in networking acts like a gateway that directs data to the right program on a device. An IP address...
ls command

ls Command: List Directory Contents in Linux

0
The ls command is fundamental for anyone working with Linux. It’s used to display the files and directories in your current location, helping you stay organized...