informationsecurity

RedELK-Client : Deploying Cybersecurity Monitoring With Ansible

The RedELK client components using Ansible, a powerful automation tool that streamlines the installation and management of cybersecurity monitoring systems.…

2 months ago

Crawl4AI – The Future Of Asynchronous Web Crawling For AI

Crawl4AI simplifies asynchronous web crawling and data extraction, making it accessible for large language models (LLMs) and AI applications. Looking…

2 months ago

OXO Scan Orchestration Engine – A Comprehensive Guide To Scalable Security Assessments

OXO is a security scanning framework built for modularity, scalability and simplicity. OXO Engine combines specialized tools to work cohesively…

2 months ago

Nullinux – The Comprehensive SMB Enumeration Tool For Penetration Testing

Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares,…

2 months ago

MANSPIDER – Advanced SMB Crawling For Sensitive Data Detection

textract, one of manspider's upstream dependencies, is no longer being updated. For this reason, you may run into problems when…

2 months ago

EDR-Antivirus-Bypass-To-Gain-Shell-Access

This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique. The code executes…

2 months ago

GShark – A Comprehensive Guide To Sensitive Information Management System Deployment

The project is based on Go and Vue to build a management system for sensitive information detection. For the full…

2 months ago

C2 Server Installation – A Comprehensive Guide For Red Team Operations

Setting up a Command and Control (C2) server is a critical step in establishing a robust red team infrastructure. This…

2 months ago

Redirector Installation – A Comprehensive Guide For Red Team Operations

Installing and configuring redirectors as part of your red team infrastructure. Follow these step-by-step instructions to deploy and optimize redirectors…

2 months ago

Generating Keys And Packages – A Guide To Securing RedELK Server Communications

This step generates TLS key pairs. This is used for encrypting the filebeat traffic between redirectors/C2servers and the RedELK server.…

2 months ago