Most of the time when you are using a public network, you are behind some kind of firewall or proxy.…
gcpwn was a tool built by myself while trying to learn GCP and leverages the newer GRPC client libraries created by google. It consists…
The files required to build and run Malcolm are available on its [GitHub page]({{ site.github.repository_url }}/tree/{{ site.github.build_revision }}). Malcolm's source-code…
The versatile capabilities of Androguard, a powerful tool for reverse engineering Android applications. This guide provides a step-by-step overview on…
Netis Cloud Probe (Packet Agent, name used before)is an open source project to deal with such situation: it captures packets…
The RdpStrike is basically a mini project I built to dive deep into Positional Independent Code (PIC) referring to a blog post written by C5pider,…
According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have…
delve into CVE-2024-26229, a critical security vulnerability identified within the csc.sys driver, pivotal in handling I/O control codes. This issue…
Invoke-DumpMDEConfig is a PowerShell script designed to extract and display Microsoft Defender configuration and logs, including excluded paths, enabled ASR rules,…
The essential steps and strategies for setting up a robust phishing engagement infrastructure. From acquiring and categorizing domains to automating…