cybersecurity

Splunk RCE – PoC: In-Depth Analysis and Exploitation Methodology

This article delves into a critical vulnerability in Splunk, identified as CVE-2023-46214. It provides a detailed analysis and a Proof…

10 months ago

CVE Half-Day Watcher

CVE Half-Day Watcher is a security tool designed to highlight the risk of early exposure of Common Vulnerabilities and Exposures…

10 months ago

WhatsApp OSINT Tool: Revolutionizing Digital Investigations

The WhatsApp OSINT Tool is a pioneering tool developed for intelligence gathering on WhatsApp. It enables tracking and monitoring of…

10 months ago

Compose StyleSheet: Revolutionizing UI Design in Jetpack Compose

Compose StyleSheet is an innovative framework designed to enhance user interface development in Jetpack Compose. Offering a versatile array of…

10 months ago

ZMap 4.0.0 RC1 – Revolutionizing Network Scanning With Multi-Port Support And More

ZMap 4.0.0 (RC1) introduces the notion of multi-port scanning, which has been a long requested feature. This is a breaking…

10 months ago

Titan – VMProtect Devirtualizer

I'm releasing my VMProtect devirtualizer for others to research, learn, and improve. This project started in 2018 as a hobby…

10 months ago

NoVmp – Unlocking VMProtect x64 With VTIL-Powered Devirtualization

Welcome to the world of NoVmp, a groundbreaking project that aims to unravel the complexities of VMProtect x64 3.0 -…

10 months ago

No-Consolation – Executing Unmanaged PEs Inline And Without Console Allocation

This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console…

10 months ago

InvisibilityCloak – A Game-Changer In C# Post-Exploitation Tools

Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project. Change…

10 months ago

Awesome-BEC – Unveiling A Comprehensive Resource For Business Email Compromise Investigations

A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains…

10 months ago