informationsecurity

Lemma – Harnessing AWS Lambda For Scalable Command-Line Tool Execution

The author of this project is not responsible for any damage or data loss incurred as a result of using…

2 months ago

AMSI Bypass via VEH – Technique Using Vectored Exception Handling

A PowerShell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking…

2 months ago

RedELK – Essential Naming Requirements For Deployment

In the complex landscape of RedELK deployment, adhering to precise naming requirements is crucial for operational success. This article delves…

2 months ago

Kdrill – Unveiling Rootkit Intrusions In Windows 64-Bit Systems

Kdrill is a tool to analyze the kernel land of Windows 64b systems (tested from Windows 7 to Windows 11).…

2 months ago

LogHunter – A Revolutionary Tool For Session Detection via Event Logs

Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN). I was once doing a very…

2 months ago

APKscan – Mastering Android Security Analysis

APKs (Android Package Kits) often leak secrets due to over-reliance on security through obscurity. Developers sometimes leave sensitive information such as API keys, tokens, and credentials hidden…

2 months ago

Akto.io – Comprehensive Security Testing And Inventory Management

Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used…

2 months ago

CCC : Cyberspace Under Siege – Understanding Crime, Espionage, And Conflict

This is a short graduate course providing an introduction to the areas of crime, espionage and conflicts in cyberspace. The…

2 months ago

Freeway – A Comprehensive Guide To WiFi Penetration Testing With Python

"Freeway" is a Python-based tool designed to enhance WiFi penetration testing and network security. Utilizing the capabilities of Scapy, it…

2 months ago

ADSpider : Advanced Real-Time Monitoring Of Active Directory Changes

Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata…

2 months ago