informationsecurity

Heap Exploitation Training : A Comprehensive Guide From Basics To Advanced TechniquesHeap Exploitation Training : A Comprehensive Guide From Basics To Advanced Techniques

Heap Exploitation Training : A Comprehensive Guide From Basics To Advanced Techniques

This article delves into our comprehensive training program designed to teach you the intricacies of exploiting heap vulnerabilities in glibc.…

2 months ago
BloodHound.py : Installation, Usage, And FeaturesBloodHound.py : Installation, Usage, And Features

BloodHound.py : Installation, Usage, And Features

BloodHound.py is a Python based ingestor for BloodHound, based on Impacket. The code in this branch is only compatible with…

2 months ago
100 Days Of Rust 2025 : From Incident Response To Linux System Programming100 Days Of Rust 2025 : From Incident Response To Linux System Programming

100 Days Of Rust 2025 : From Incident Response To Linux System Programming

In 2025 I wanted to try something new. In addition to a traditional 100 days of Yara, I will also…

2 months ago
Presenterm : Revolutionizing Terminal-Based Presentations With MarkdownPresenterm : Revolutionizing Terminal-Based Presentations With Markdown

Presenterm : Revolutionizing Terminal-Based Presentations With Markdown

presenterm lets you create presentations in markdown format and run them from your terminal, with support for image and animated…

2 months ago
JailbreakEval : Automating the Evaluation Of Language Model SecurityJailbreakEval : Automating the Evaluation Of Language Model Security

JailbreakEval : Automating the Evaluation Of Language Model Security

Jailbreak is an attack that prompts a language model to give actionable responses to harmful behaviors, such as writing an…

2 months ago
HASH : Harnessing HTTP Agnostic Software Honeypots For Enhanced CybersecurityHASH : Harnessing HTTP Agnostic Software Honeypots For Enhanced Cybersecurity

HASH : Harnessing HTTP Agnostic Software Honeypots For Enhanced Cybersecurity

The main philosophy of HASH is to be easy to configure and flexible to mimic any software running on HTTP/HTTPs.…

2 months ago
SECurityTr8Ker : SEC Cybersecurity Disclosure MonitorSECurityTr8Ker : SEC Cybersecurity Disclosure Monitor

SECurityTr8Ker : SEC Cybersecurity Disclosure Monitor

SECurityTr8Ker is a Python application designed to monitor the U.S. Securities and Exchange Commission's (SEC) RSS feed for new 8-K…

2 months ago
ripgrep : The Fast, Flexible Search Toolripgrep : The Fast, Flexible Search Tool

ripgrep : The Fast, Flexible Search Tool

ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will…

2 months ago
InfluxDB : The Open Source Leader In Time Series Data And Real-Time AnalyticsInfluxDB : The Open Source Leader In Time Series Data And Real-Time Analytics

InfluxDB : The Open Source Leader In Time Series Data And Real-Time Analytics

InfluxDB is the leading open source time series database for metrics, events, and real-time analytics. Project Status This main branch…

2 months ago
Fuxploider : Automating File Upload Vulnerability ExploitationFuxploider : Automating File Upload Vulnerability Exploitation

Fuxploider : Automating File Upload Vulnerability Exploitation

Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws.…

2 months ago