informationsecurity

Microsoft-Analyzer-Suite (Community Edition) : A Deep Dive Into Analyzing Microsoft 365 Security

Explore the capabilities of the Microsoft-Analyzer-Suite (Community Edition), a powerful collection of PowerShell scripts designed to enhance your security analysis.…

2 months ago

Cloud_Enum – Advancing Cloud Security Through Multi-Cloud OSINT Tools

I built this tool in 2019 for a pentest involving Azure, as no other enumeration tools supported it at the…

2 months ago

EDRPrison – Advanced Evasion Techniques Using Legitimate WFP Drivers

EDRPrison leverages a legitimate WFP callout driver, WinDivert, to effectively silence EDR systems. Drawing inspiration from tools like Shutter, FireBlock, and EDRSilencer, this project…

2 months ago

Using Hardware -Based Exploits : A Comprehensive Guide To Braktooth, Internalblue, And Automated Techniques

You need to buy the following hardware to be able to run the exploits: The installation is partially automated in…

2 months ago

Manual Exploits – Assessing Device Security Through Direct Interaction

This check could be used to assess the severity of the attacks. If the target device is pairable even if…

2 months ago

Workflow – Comprehensive Guide To Using BlueToolkit For Bluetooth Vulnerability Testing

The toolkit has several ways it could be used, due to its modular nature, but the main feature of it…

2 months ago

Awesome Red Teaming – A Comprehensive Guide To Advanced Security Techniques

Explore the dynamic world of red teaming with our extensive guide designed for cybersecurity professionals and enthusiasts alike. 'Awesome Red…

2 months ago

Awesome OSINT – A Comprehensive Resource For Cybersecurity Experts

A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources.…

2 months ago

Pwnat : Bridging NAT Barriers Without Port Forwarding

pwnat, by Samy Kamkar, is a tool that allows any client behind a NAT to communicate with a server behind…

2 months ago

CLI Usage : Command-Line Mastery With The BlueKit Toolkit

Explore the comprehensive command-line interface (CLI) of the BlueKit toolkit designed for cybersecurity professionals. This article delves into the various…

2 months ago