Needless to say, most websites suffer from various types of bugs which may eventually lead to vulnerabilities. Why would this…
On Windows system, it was found that GlobalProtect (App version 6.1.1-5 and 6.2.0-89) was vulnerable to arbitrary file delete with…
A Feminist Guide to Digital Defense serves as a comprehensive resource for enhancing online safety and privacy through a feminist…
This is a proof of concept for CVE-2024-25153, a Remote Code Execution vulnerability in Fortra FileCatalyst Workflow 5.x, before 5.1.6…
In the shadowy realms of cyber espionage, the Kimsuky PowerShell Backdoor stands as a sophisticated tool designed for stealthy infiltrations…
A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak…
Digital Forensics and Incident Response (DFIR) teams are groups of people in an organization responsible for managing the response to…
An Ansible Role that installs Bloodhound-CE on a debian based system. Checks if {{ ludus_bloodhound_ce_install_path }}/docker-compose.yml exists If not, it installs vanilla…
DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing…
A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and…