According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have…
delve into CVE-2024-26229, a critical security vulnerability identified within the csc.sys driver, pivotal in handling I/O control codes. This issue…
Invoke-DumpMDEConfig is a PowerShell script designed to extract and display Microsoft Defender configuration and logs, including excluded paths, enabled ASR rules,…
The essential steps and strategies for setting up a robust phishing engagement infrastructure. From acquiring and categorizing domains to automating…
This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build…
Kupa3 allows you to draw connections between scripts on specific website. It search for javascript code or source attribute, in…
In the digital age, forensic analysis of messaging applications like WhatsApp is crucial for both security and investigative purposes. 'Whapa'…
A powerful tool designed to extract and decode location data stored on iOS devices. By accessing the StateModel#.archive files, users…
This repo contains a toolkit for performing post-mortem analysis of Docker runtime environments based on forensic HDD copies of the…
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information…