informationsecurity

B(l)utter: A Tool for Reverse Engineering Flutter Mobile Applications

Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only).…

1 year ago

BestEDROfTheMarket: A User-Mode EDR Evasion Lab for Learning and Testing

Little AV/EDR Evasion Lab for training & learning purposes. (????️ under construction..)​ ____ _ _____ ____ ____ ___ __ _____ _…

1 year ago

GitAlerts: Enhancing GitHub Security and Monitoring for Organization Repositories

GitHub has become an important tool for version control and project management in the ever-changing world of software development and…

1 year ago

CVE-2023-6553 Exploit V2

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7…

1 year ago

ICSpector: Microsoft’s Open-Source ICS Forensics Framework

Microsoft ICS Forensics Tools framework is an open-source forensics framework that enables the analysis of Industrial PLC metadata and project…

1 year ago

Atlassian Companion RCE Vulnerability Proof of Concept (CVE-2023-22524)

Atlassian Companion for macOS has a serious remote code execution vulnerability that was just found. It is called CVE-2023-22524. This…

1 year ago

ADOKit: Azure DevOps Services Attack Toolkit

Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by…

1 year ago

CreateToken: Exploiting ZwCreateToken() for SYSTEM Token

In the realm of cybersecurity, understanding and exploiting Windows APIs is pivotal for both defenders and attackers. In this article,…

1 year ago

LDAP Nom Nom: Insane-Speed Active Directory User Enumeration via LDAP Ping Exploitation

With the help of LDAP Ping requests (cLDAP), "LDAP Nom Nom" is a powerful tool that quickly and quietly brute-forces…

1 year ago

Mastering YARA: A Comprehensive Guide to Detection Engineering and Rule Development

Threat identification and analysis are very important for keeping systems and networks safe in the ever-changing world of cybersecurity. YARA…

1 year ago