garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination,…
ADCFFS is a PowerShell script that can be used to exploit the AD CS container misconfiguration allowing privilege escalation and…
Tartufo will, by default, scan the entire history of a git repository for any text which looks like a secret,…
Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at home. If you only know…
A data hoarder’s dream come true: bundle any web page into a single HTML file. You can finally replace that…
Mountpoint for Amazon S3 is a simple, high-throughput file client for mounting an Amazon S3 bucket as a local file…
Your malware's favorite sandbox - where red teamers come to bury their payloads. A sandbox environment designed specifically for malware…
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. This technique…
This article delves into our comprehensive training program designed to teach you the intricacies of exploiting heap vulnerabilities in glibc.…
BloodHound.py is a Python based ingestor for BloodHound, based on Impacket. The code in this branch is only compatible with…