Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF. Dangerzone works like this: You…
Nord Stream is a tool that allows you extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently supports Azure…
Scripts to run within Ghidra, maintained by the Trellix ARC team. Ghidra, the open-source software reverse engineering tool, is known…
This is PoC for arbitrary directory creation bug in Container Manager service. This PoC is not thoroughly tested so it…
In the realm of cybersecurity, understanding the vulnerabilities within operating systems is paramount. "Coerced Potato" delves into the intricate world…
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and…
In the realm of cybersecurity and network reconnaissance, RustHound emerges as a versatile hero. This cross-platform BloodHound collector tool, built…
Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# / .NET…
Introduction The majority of WPA2-PSK and WEP encryption attacks can be carried out using the WificraK tool. Using crunch or…
Welcome to the 'Guide-CEH-Practical-Master', your essential roadmap to mastering the Certified Ethical Hacker (Practical) exam. Dive deep into the tools,…