cybersecurity

DOUGLAS-042: Enhancing Threat Hunting and Incident Response with PowerShell Scripting

Video https://www.youtube.com/watch?v=8KVeNvA6M0s DOUGLAS-042 stands as an ingenious embodiment of a PowerShell script meticulously designed to expedite the triage process and…

9 months ago

NetProbe: A Comprehensive Guide to Network Device Scanning and Monitoring

Keeping an eye on and controlling the devices on your network is important for safety and efficiency in a world…

9 months ago

LooneyPwner: Exploiting the glibc ‘Looney Tunables’ Flaw in Linux

Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. LooneyPwner is a proof-of-concept (PoC) exploit…

9 months ago

MailChecker: Revolutionizing Email Validation Across Languages with Advanced Domain Database

In a modern world where email is so important, it's very important to keep it safe. MailChecker becomes a key…

9 months ago

AcuAutomate: Streamlining Pentesting and Bug Hunting with Advanced Acunetix Integration

AcuAutomateĀ is an unofficial Acunetix CLI tool that simplifies automated pentesting and bug hunting across extensive targets. It's a valuable aid…

9 months ago

py-amsi: Streamlining Malware Detection in Python with the Windows AMSI API

py-amsi is a library that scans strings or files for malware using the Windows Antimalware Scan Interface (AMSI) API. AMSI…

9 months ago

Elevation Station: Mastering Privilege Escalation with Advanced Token Manipulation Techniques

ElevationStation is a privilege escalation tool. It works by borrowing from commonly used escalation techniques involving manipulating/duplicating process and thread…

9 months ago

Enhancing macOS Security: A Guide to Red Canary Mac Monitor

Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research, malware triage, and system troubleshooting.…

9 months ago

Afuzz – An automated web path fuzzing tool

Finding security holes is a lot like finding hidden treasures in the world of bug bounty hunts. "Afuzz" turns out…

10 months ago

PassBreaker: A Comprehensive Guide to Advanced Password Cracking Techniques

Even though cybersecurity is always changing, cracking passwords is still an important skill for security workers to have. "PassBreaker," a…

10 months ago