DetectDee – The Ultimate Guide To Tracing Social Media Profiles

0

DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing usernames, email addresses, or phone numbers. Tailored for cybersecurity experts, it offers precision, evasion capabilities against web application firewalls, and easy integration. This guide delves into the functionalities, installation, and usage of DetectDee, ensuring a seamless experience for those...

Awesome Honeypots : Guardians Of The Digital Frontier – A Comprehensive Guide To Cybersecurity Tools

0

A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and others, with a focus on free and open source projects. There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the guide. Discover more awesome lists at sindresorhus/awesome. Contents Awesome Honeypots  Contents Related Lists Honeypots Honeyd Tools Network...

Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques

0

Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is meant to be used with kdmapper or a similar driver mapper. I am just learning about kernel driver development, so this is for educational purposes mainly. Usage You can integrate Banshee into your tooling, by including the Banshee.hpp file in your project, e.g.: Banshee banshee = Banshee(); banshee.Initialize(); int targetPid...

Mali GPU Kernel LPE – Unveiling Root Access Exploits In Google Pixel Devices

0

This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox, which I independently identified and reported to Google. It includes a kernel exploit that achieves arbitrary kernel r/w capabilities. Consequently, it disables SELinux and elevates privileges to root on Google Pixel 7 and 8 Pro models running the following...

v2.3.0 – Enhanced Runtime Display And Custom Configurations In Naabu

0

In the latest software evolution, version 2.3.0 marks a significant milestone for Naabu, introducing key enhancements that users have eagerly anticipated. This update unveils the capability to display results dynamically at runtime and the flexibility to specify custom configuration files, among other critical bug fixes. Spearheaded by a collaborative effort, these advancements promise to elevate the user experience and...

DarkGPT : A Step-By-Step Installation Guide For Interacting With Leaked Databases

0

DarkGPT unveils the shadowy corners of cyberspace by granting access to leaked databases through a cutting-edge AI powered by GPT-4-200K. This comprehensive guide outlines the installation process, from setting up your environment to running the project, ensuring you're equipped to navigate this complex landscape. Dive into the world of DarkGPT and unlock the potential of AI in cybersecurity. Installation Guide...

Awesome Hacking – An Amazing Project : The Ultimate Resource Guide For Cybersecurity Exploration

0

A curated list of awesome Hacking. Inspired by awesome-machine-learning If you want to contribute to this list (please do), send me a pull request! For a list of free hacking books available for download, go here Table Of Contents System Tutorials Tools Docker General Reverse Engineering Tutorials Tools General Web Tools General Network Tools Forensic Tools Cryptography Tools Wargame System Reverse Engineering Web Cryptography Bug bounty CTF Competition General OS Online resources Post exploitation tools ETC System Tutorials Roppers Computing Fundamentals Free, self-paced curriculum that builds a base of knowledge in computers and networking. Intended to build up a student...

The Spy’s Job – Mastering OSINT With XDeadHackerX’s Comprehensive Toolkit

0

Buenas, soy XDeadHackerX y quiero presentaros mi nueva herramienta llamada The_Spy´s_Job.  Esta Tool está enfocado al OSINT de casi todos los ámbitos (Personas, Nicknames, Redes Sociales, Emails, Números de Teléfono, Páginas Webs, IPs Públicas e Imágenes) Mi idea era recopilar y automatizar todas las técnicas de OSINT más Avanzadas posibles en una sola Herramienta y así trabajar de la forma más cómoda y rápida posible, ya que...

WinSOS – Harnessing Trusted Binaries For Stealthy DLL Hijacking

0

WinSOS represents a sophisticated technique that turns the Windows operating system's own features against it. By manipulating executables in the WinSxS folder, a component trusted by Windows, attackers can discreetly execute malicious code. This method, building on DLL Search Order Hijacking, does not require elevated privileges, making it a stealthy approach for infiltrating Windows 10 and 11 systems. It...

LocalSend – The Ultimate Guide To Secure, Local Network Communication

0

LocalSend is a free, open-source app that allows you to securely share files and messages with nearby devices over your local network without needing an internet connection. About Screenshots Download How it Works Getting Started Contributing Translation Bug fixes and improvements Building Android iOS macOS Windows Linux About LocalSend is a cross-platform app that enables secure communication between devices using a REST API and HTTPS encryption. Unlike other messaging apps that rely on external servers,...