informationsecurity

Bypass Bot Detection – Enhancing Burp Suite With TLS Cipher Mutation

In the ever-evolving landscape of cybersecurity, staying ahead of detection mechanisms is crucial. This article explores a Burp Suite extension…

2 months ago

Adding An Exploit – How To Integrate And Manage New Exploits In BlueToolkit

To add an exploit one has to go through a similar process as with the hardware profile, but in the…

2 months ago

Flipper – Your Ultimate Guide To Resources, Codes, And Community Support

The vibrant world of Flipper Zero, a playground where innovation meets utility. This article is your gateway to exploring the…

2 months ago

BunkerWeb – Revolutionizing Web Security With Advanced Firewall Capabilities

BunkerWeb is a next-generation and open-source Web Application Firewall (WAF). Being a full-featured web server (based on NGINX under the hood), it…

2 months ago

EDR Telemetry – Capabilities Of Products A Comparative Analysis

This repo provides a list of telemetry features from EDR products and other endpoint agents such as Sysmon broken down by category. The main…

2 months ago

Adding A Hardware Profile : A Step-by-Step Tutorial For System Configuration

If you need to add new hardware you have to follow the following process: Create a hardware profile {name}.yaml file…

2 months ago

dnsx – A Comprehensive DNS Toolkit For Advanced Network Probing

dnsx is a fast and multi-purpose DNS toolkit designed for running various probes through the retryabledns library. It supports multiple DNS queries, user…

2 months ago

MEID-SignIns-TorExitNodes : Leveraging Microsoft Sentinel To Monitor And Manage Tor Network Access

This KQL query retrieves all Tor exit nodes from the official tor project website. Tor exit nodes are the gateways…

2 months ago

MultCheck : A User-Friendly, Open-Source Malware AV Testing Tool

An innovative, open-source tool designed to streamline malware analysis by testing the effectiveness of multiple antivirus (AV) engines simultaneously. Developed…

2 months ago

CLay – Enhancing Web Security hrough Deceptive Reverse Proxies

CLay offers a unique and powerful feature that goes beyond traditional security measures. CLay takes deception to a new level…

2 months ago