cybersecurity

Elitewolf – Critical Infrastructure Security Insights

This repository contains various ICS/SCADA/OT focused signatures and analytics. The end goal is to enable Critical Infrastructure Defenders, Intrusion Analysts,…

11 months ago

SubCat – A Fast And Efficient Subdomain Enumeration Tool

SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple…

11 months ago

LinikatzV2 – Unveiling UNIX Secrets in Active Directory Environments

LinikatzV2 is a bash script based on the Linikatz tool developed by time-machine (link). It allows post-exploitation tasks on UNIX…

11 months ago

Msprobe – On-Prem Microsoft Solutions Discovery For Security

Discovering and securing on-premises Microsoft solutions is paramount in today's cybersecurity landscape. In this article, we delve into 'msprobe,' a…

11 months ago

Aftermath – Swift-Powered Incident Response And Data Analysis

Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently…

11 months ago

Dangerzone – Safely Convert Risky Documents Into Secure PDFs

Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF. Dangerzone works like this: You…

11 months ago

Nord Stream – Uncovering Secrets With A CICD Exploitation Toolkit

Nord Stream is a tool that allows you extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently supports Azure…

11 months ago

Ghidra Script Mastery – Managing And Automating With GhidraScripts For Golang

Scripts to run within Ghidra, maintained by the Trellix ARC team. Ghidra, the open-source software reverse engineering tool, is known…

11 months ago

CVE-2023-36723 – Windows Sandbox Directory Creation Vulnerability

This is PoC for arbitrary directory creation bug in Container Manager service. This PoC is not thoroughly tested so it…

11 months ago

Coerced Potato – Windows Privilege Escalation

In the realm of cybersecurity, understanding the vulnerabilities within operating systems is paramount. "Coerced Potato" delves into the intricate world…

11 months ago