Sysdig Inspect – A Comprehensive Guide To Container Troubleshooting And Securit
Sysdig Inspect is a powerful opensource interface for container troubleshooting and security investigation Inspect's user interface is designed to intuitively navigate the data-dense sysdig captures that contain granular system, network, and application activity of a Linux system. Sysdig Inspect helps you understand trends, correlate metrics and find the needle in the haystack. It comes packed with features designed to support both...
Checking The Installation – A Guide To Installing And Verifying Tartuf
You can install tartufo in the usual ways you would for a Python Package, or using docker to pull the latest tartufo docker image from Docker Hub. Installation with pip: pip install tartufo Installation with docker: docker pull godaddy/tartufo If you would like to install the latest in-development version of tartufo, this can also be done with pip. pip install -e git+ssh://git@github.com/godaddy/tartufo.git#egg=tartufo Checking The Installation When tartufo is installed, it inserts an eponymous command into your path. So if...
CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability
We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized users to execute malicious code remotely. We present a comprehensive exploration of both the exploit (CVE-2024-38077-EXP) and the proof of concept (CVE-2024-38077-POC), providing in-depth technical insights into the vulnerability's impact and exploitation techniques. Developed by security researchers qi4L and...
Tempest – A Rust Journey Through Command And Control Research
This is a research command and control framework. What I mean by this, is that it is meant for research purposes. It is not meant to fully replace cobalt strike and all your other c2s for production ops. When I decided to write this project, I did so for a learning experience. I wanted to sit and try to plan...
OSINT Cheat Sheet – Essential Tools And Resources For Digital Investigations
In the rapidly evolving world of digital investigations, staying ahead with the right tools is crucial. This OSINT Cheat Sheet compiles essential resources and tools that aid in gathering open-source intelligence effectively. Whether you're delving into social media intelligence (SOCMINT), analyzing images, or exploring geospatial data, these curated tools will empower your research and investigative efforts. Perfect for both...
Maestro – Revolutionizing Remote Operations With Seamless Azure Integratio
In the evolving landscape of cybersecurity, the ability to conduct sophisticated post-exploitation operations discretely and efficiently is paramount. Enter Maestro, a cutting-edge tool designed to seamlessly interact with Microsoft's Intune and EntraID, enabling operators to execute remote actions without the cumbersome steps typically associated with Azure services. Maestro bypasses traditional barriers such as user password retrieval and complex authentication...
CVE-2024-38077 : A Zero-Click RCE Threat In Windows Server 2025
Earlier this year, we conducted an in-depth analysis of the Windows Remote Desktop Services. Multiple vulnerabilities were discovered, and all related vulnerabilities (56 cases) have been reported to Microsoft. Among them were several Preauth RCE vulnerabilities (Unauthenticated non-sandboxed 0-click RCE) in the Remote Desktop Licensing Service. These vulnerabilities can be used to build multiple Preauth RCE exploitations targeting the...
TrickDump – Evading Detection With Advanced Memory Dump Techniques
TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the memory region dumps. In three steps: Lock: Get OS information using RtlGetVersion. Shock: Get SeDebugPrivilege privilege with NtOpenProcessToken and NtAdjustPrivilegeToken, open a handle with NtGetNextProcess and NtQueryInformationProcess and then get modules information using NtQueryInformationProcess and NtReadVirtualMemory. Barrel: Get SeDebugPrivilege privilege, open a...
Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources
This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and enthusiasts. Whether you're a beginner or an experienced red teamer, these tools will enhance your skills in simulating cyber attacks and strengthening defenses. Dive into our curated collection and join a community dedicated to advancing cybersecurity through practical, hands-on...
100 Red Team Projects – A Comprehensive Guide For Pentesters And Network Managers
Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students are learning, creating and exploiting all types of systems. The internet is not only the most common means through which people interact and chat, but also a place where they are constantly exposed to a world where anyone can...