cybersecurity

Frameless BITB – A New Approach To Phishing Attacks

A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters…

8 months ago

Chista | Open Source Threat Intelligence Framework – Understanding, Predicting, And Defending Against Cyber Threats

In the ever-evolving landscape of cybersecurity threats, staying one step ahead of malicious actors is crucial. Introducing Chista, an open-source…

8 months ago

Cybersecurity Content – Unveiling 2024 And Beyond In Exploitation, Vulnerabilities, And Secure Coding

In the ever-evolving landscape of cybersecurity, staying informed about the latest trends and developments is crucial. "Cybersecurity Content: 2024 and…

8 months ago

ChatGPT Source Watch – Unveiling The Chronicles Of ChatGPT

This meticulously curated repository offers a treasure trove for tracking the historical webpack chunks, along with automation scripts and a…

8 months ago

V9.7.5 – Local Privilege Escalation : Nuclei Release With CVE Updates And New Templates

In our latest release, we have added a significant number of trending CVEs and are excited to announce the addition…

8 months ago

Vulnerability Checklist – Comprehensive Guide For Web Applications And Frameworks

The security of web applications and frameworks is of paramount importance. To help ensure the safety of your systems, this…

8 months ago

X64dbgbinja – Bridging The Gap Between Binary Ninja And X64dbg With An Official Plugin

The official plugin designed to enhance the synergy between Binary Ninja and x64dbg. In this article, we'll delve into the…

8 months ago

v2024.1 – Unlocking The Future With Locksmith

Locksmith takes a significant step forward, addressing ownership issues with newfound automation. This update, led by contributors like @TrimarcJake, @techspence,…

8 months ago

Afrog – Empowering Bug Bounty, Pentesting, And Red Teaming With A High-Performance Security Tool

In the ever-evolving landscape of cybersecurity, the need for robust tools that aid Bug Bounty programs, Penetration Testing (Pentest), and…

8 months ago

Azure Outlook C2 – Unveiling Remote Control Of Windows Devices Via Outlook Mailbox

Azure Outlook Command And Control that uses Microsoft Graph API for C2 communications And data exfiltration. The intriguing world of…

8 months ago