cybersecurity

CVE-2024-29849 : The Veeam Backup Enterprise Manager Authentication Bypass

According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have…

11 months ago

CVE-2024-26229 : Address Validation Flaws In IOCTL With METHOD_NEITHER

delve into CVE-2024-26229, a critical security vulnerability identified within the csc.sys driver, pivotal in handling I/O control codes. This issue…

11 months ago

DumpMDEConfig – Extracting Microsoft Defender Configuration And Logs With PowerShell Script

Invoke-DumpMDEConfig is a PowerShell script designed to extract and display Microsoft Defender configuration and logs, including excluded paths, enabled ASR rules,…

11 months ago

Phishing Engagement Infrastructure Setup Guide

The essential steps and strategies for setting up a robust phishing engagement infrastructure. From acquiring and categorizing domains to automating…

11 months ago

Detection Lab – A Comprehensive Overview Of Its Features, Documentation, And Legacy

This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build…

11 months ago

Kupa3 – Script Dependencies And Domain Connections On Websites

Kupa3 allows you to draw connections between scripts on specific website. It search for javascript code or source attribute, in…

11 months ago

Whapa – Comprehensive Guide To The WhatsApp Forensic Toolset

In the digital age, forensic analysis of messaging applications like WhatsApp is crucial for both security and investigative purposes. 'Whapa'…

11 months ago

iOS Frequent Locations Dumper – A Comprehensive Guide To Extracting Location Data

A powerful tool designed to extract and decode location data stored on iOS devices. By accessing the StateModel#.archive files, users…

11 months ago

The Docker Forensics Toolkit : A Comprehensive Guide For Post-Mortem Analysis

This repo contains a toolkit for performing post-mortem analysis of Docker runtime environments based on forensic HDD copies of the…

11 months ago

Holehe Maltego Transform – Your Tool For Digital Investigation And Information Gathering

holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information…

11 months ago