informationsecurity

RdpStrike – Harnessing PIC And Hardware Breakpoints For Credential Extraction

The RdpStrike is basically a mini project I built to dive deep into Positional Independent Code (PIC) referring to a blog post written by C5pider,…

3 months ago

CVE-2024-29849 : The Veeam Backup Enterprise Manager Authentication Bypass

According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have…

3 months ago

CVE-2024-26229 : Address Validation Flaws In IOCTL With METHOD_NEITHER

delve into CVE-2024-26229, a critical security vulnerability identified within the csc.sys driver, pivotal in handling I/O control codes. This issue…

3 months ago

DumpMDEConfig – Extracting Microsoft Defender Configuration And Logs With PowerShell Script

Invoke-DumpMDEConfig is a PowerShell script designed to extract and display Microsoft Defender configuration and logs, including excluded paths, enabled ASR rules,…

3 months ago

Phishing Engagement Infrastructure Setup Guide

The essential steps and strategies for setting up a robust phishing engagement infrastructure. From acquiring and categorizing domains to automating…

3 months ago

Detection Lab – A Comprehensive Overview Of Its Features, Documentation, And Legacy

This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build…

3 months ago

Kupa3 – Script Dependencies And Domain Connections On Websites

Kupa3 allows you to draw connections between scripts on specific website. It search for javascript code or source attribute, in…

3 months ago

Whapa – Comprehensive Guide To The WhatsApp Forensic Toolset

In the digital age, forensic analysis of messaging applications like WhatsApp is crucial for both security and investigative purposes. 'Whapa'…

3 months ago

iOS Frequent Locations Dumper – A Comprehensive Guide To Extracting Location Data

A powerful tool designed to extract and decode location data stored on iOS devices. By accessing the StateModel#.archive files, users…

3 months ago

The Docker Forensics Toolkit : A Comprehensive Guide For Post-Mortem Analysis

This repo contains a toolkit for performing post-mortem analysis of Docker runtime environments based on forensic HDD copies of the…

3 months ago