cybersecurity

LooneyPwner: Exploiting the glibc ‘Looney Tunables’ Flaw in Linux

Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions. LooneyPwner is a proof-of-concept (PoC) exploit…

1 year ago

MailChecker: Revolutionizing Email Validation Across Languages with Advanced Domain Database

In a modern world where email is so important, it's very important to keep it safe. MailChecker becomes a key…

1 year ago

AcuAutomate: Streamlining Pentesting and Bug Hunting with Advanced Acunetix Integration

AcuAutomateĀ is an unofficial Acunetix CLI tool that simplifies automated pentesting and bug hunting across extensive targets. It's a valuable aid…

1 year ago

py-amsi: Streamlining Malware Detection in Python with the Windows AMSI API

py-amsi is a library that scans strings or files for malware using the Windows Antimalware Scan Interface (AMSI) API. AMSI…

1 year ago

Elevation Station: Mastering Privilege Escalation with Advanced Token Manipulation Techniques

ElevationStation is a privilege escalation tool. It works by borrowing from commonly used escalation techniques involving manipulating/duplicating process and thread…

1 year ago

Enhancing macOS Security: A Guide to Red Canary Mac Monitor

Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research, malware triage, and system troubleshooting.…

1 year ago

Afuzz – An automated web path fuzzing tool

Finding security holes is a lot like finding hidden treasures in the world of bug bounty hunts. "Afuzz" turns out…

1 year ago

PassBreaker: A Comprehensive Guide to Advanced Password Cracking Techniques

Even though cybersecurity is always changing, cracking passwords is still an important skill for security workers to have. "PassBreaker," a…

1 year ago

WinDiff: A Comprehensive Tool for Windows Binary Comparison and Analysis

WinDiff is an open-source web-based tool that allows browsing and comparing symbol, type and syscall information of Microsoft Windows binaries…

1 year ago

Aladdin: Advanced .NET Payload Generation and Execution Techniques

.-. [.-''-., | //`~\) (<| 0\0|>_ ";\ _"/ \\_ _, __\|'._/_ \ '='-, /\ \ || )_///_\>> ( '._ T…

1 year ago