cybersecurity

Abusing Family Refresh Tokens For Unauthorized Access And Persistence In Azure Active Directory

In the evolving landscape of cloud security, a novel vulnerability within Azure Active Directory (Azure AD) exposes a critical risk…

1 year ago

BackdoorSim – A Comprehensive Guide To Ethical Remote Administration And Monitoring

BackdoorSim is a remote administration and monitoring tool designed for educational and testing purposes. It consists of two main components: ControlServer and BackdoorClient. The…

1 year ago

UserFinder : A Step-by-Step Guide To Installation And Usage For Social Media Discovery

UserFinder is a cutting-edge tool designed for efficient social media discovery, enabling users to find comprehensive information across various platforms.…

1 year ago

Lucid – Revolutionizing Fuzzing Through Bochs Emulation Technology

Lucid is an educational fuzzing project which aims to create a Bochs emulator based snapshot fuzzer capable of fuzzing traditionally…

1 year ago

Better Data Analysis, Myers Diffing Algorithm And UI Improvements – Enhancing ImHex

The latest update to ImHex introduces significant enhancements aimed at improving the user experience for data analysis enthusiasts and developers…

1 year ago

CVE-2024-25600_Nuclei-Template : Unveiling Remote Code Execution In WordPress’s Bricks Plugin

In the digital landscape of WordPress themes and plugins, a critical vulnerability has emerged with the potential to compromise website…

1 year ago

NTLM Relay Gat – Automating Exploitation Of NTLM Relay Vulnerabilities

NTLM Relay Gat revolutionizes the approach to exploiting NTLM relay vulnerabilities by automating the use of the Impacket suite's ntlmrelayx.py…

1 year ago

Nmap Analysis Tool – Enhancing Network Security Through Advanced Analysis And Reporting

This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two…

1 year ago

Shelter : Mastering In-Memory Payload Encryption With Advanced ROP Techniques

Shelter is a completely weaponized sleep obfuscation technique that allows to fully encrypt your in-memory payload making an extensive use…

1 year ago

ADeleg – Mastering Active Directory Delegation Management

Is an Active Directory delegation management tool. It allows you to make a detailed inventory of delegations set up so…

1 year ago