cybersecurity

Volana – Mastering Stealth Command Execution During Penetration Testin

During pentest, an important aspect is to be stealth. For this reason you should clear your tracks after your passage. Nevertheless, many…

5 months ago

OSINT-Collector : Harnessing Advanced Frameworks For Domain-Specific Intelligence Gathering

OSINT-Collector is an advanced framework that facilitates the collection, analysis, and management of OSINT information useful for conducting investigations in specific domains of interest. Table Of Contents…

5 months ago

GoAccess : A Comprehensive Guide To Real-Time Web Log Analysis And Visualization

GoAccess is an open source real-time web log analyzer and interactive viewer that runs in a terminal on *nix systems or through your browser. It…

5 months ago

Wstunnel – Revolutionizing Network Access Through Advanced Tunneling Techniques

Most of the time when you are using a public network, you are behind some kind of firewall or proxy.…

5 months ago

GCPwn – A Comprehensive Tool For GCP Security Testing

gcpwn was a tool built by myself while trying to learn GCP and leverages the newer GRPC client libraries created by google. It consists…

5 months ago

Quick Start – Comprehensive Guide To Installing And Configuring Malcolm On Linux Platforms

The files required to build and run Malcolm are available on its [GitHub page]({{ site.github.repository_url }}/tree/{{ site.github.build_revision }}). Malcolm's source-code…

5 months ago

Installation – Comprehensive Guide To Using Androguard

The versatile capabilities of Androguard, a powerful tool for reverse engineering Android applications. This guide provides a step-by-step overview on…

5 months ago

Netis Cloud Probe – Bridging Network Monitoring Gaps ith Advanced Packet Capture Tools

Netis Cloud Probe (Packet Agent, name used before)is an open source project to deal with such situation: it captures packets…

5 months ago

RdpStrike – Harnessing PIC And Hardware Breakpoints For Credential Extraction

The RdpStrike is basically a mini project I built to dive deep into Positional Independent Code (PIC) referring to a blog post written by C5pider,…

5 months ago

CVE-2024-29849 : The Veeam Backup Enterprise Manager Authentication Bypass

According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have…

5 months ago