CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities
Introduction
When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like NVD and MITRE are valuable, but relying on them directly...
Nuclei-Templates-Labs : A Hands-On Security Testing Playground
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to practice vulnerability detection and exploitation in a controlled environment....
ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable logic into complex state-driven structures.
The ollvm-unflattener tool addresses...
Cybersecurity – Tools And Their Function
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious threats.
These tools are designed to address specific security...
Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary code by exploiting improper side-effect modeling in TurboFan’s JSCreateObject...
Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides foundational insights into browser internals and tools critical for...
Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on a suite of specialized tools to analyze and weaponize...
Awesome Solana Security : Enhancing Program Development
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more secure Solana programs.
It provides a wide range of...
IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting the NGINX Ingress Controller for Kubernetes.
These vulnerabilities, including...
Endpoint With Missing Agents : Identifying And Managing Security Gaps
Endpoint security is crucial for protecting organizations from cyber threats. However, managing endpoint agents can be challenging, especially when devices are missing critical security...