cybersecurity

Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques

Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is…

6 months ago

Mali GPU Kernel LPE – Unveiling Root Access Exploits In Google Pixel Devices

This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox,…

6 months ago

v2.3.0 – Enhanced Runtime Display And Custom Configurations In Naabu

In the latest software evolution, version 2.3.0 marks a significant milestone for Naabu, introducing key enhancements that users have eagerly…

6 months ago

DarkGPT : A Step-By-Step Installation Guide For Interacting With Leaked Databases

DarkGPT unveils the shadowy corners of cyberspace by granting access to leaked databases through a cutting-edge AI powered by GPT-4-200K.…

6 months ago

Awesome Hacking – An Amazing Project : The Ultimate Resource Guide For Cybersecurity Exploration

A curated list of awesome Hacking. Inspired by awesome-machine-learning If you want to contribute to this list (please do), send me…

6 months ago

The Spy’s Job – Mastering OSINT With XDeadHackerX’s Comprehensive Toolkit

Buenas, soy XDeadHackerX y quiero presentaros mi nueva herramienta llamada The_Spy´s_Job.  Esta Tool está enfocado al OSINT de casi todos los ámbitos (Personas, Nicknames, Redes Sociales,…

6 months ago

WinSOS – Harnessing Trusted Binaries For Stealthy DLL Hijacking

WinSOS represents a sophisticated technique that turns the Windows operating system's own features against it. By manipulating executables in the…

6 months ago

LocalSend – The Ultimate Guide To Secure, Local Network Communication

LocalSend is a free, open-source app that allows you to securely share files and messages with nearby devices over your…

6 months ago

BackupCreds – Mastering Credential Dumping In Windows

BackupCreds presents a groundbreaking method for security professionals to exploit SeTrustedCredmanAccessPrivilege, enabling the dumping of stored credentials in Windows environments.…

6 months ago

Android Security Awesome : Securing the Android Ecosystem – A Comprehensive Resource Guide

In the ever-evolving landscape of mobile technology, Android security remains a paramount concern for developers, researchers, and users alike. 'Android…

6 months ago