informationsecurity

Program Exposes Unsound And Incomplete Behavior In Compiler

The provided program highlights critical issues within the compiler, exposing both soundness and completeness violations. These bugs manifest in unexpected…

1 week ago

BypassAV : Techniques To Evade Antivirus And EDR Systems

BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and Endpoint Detection and Response (EDR)…

1 week ago

ComDotNetExploit : Exploiting Windows Protected Process Light (PPL)

ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows Protected Process Light (PPL) by…

1 week ago

Trigon : A Revolutionary Kernel Exploit For iOS

Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability. This exploit, developed by Alfie…

1 week ago

Bug Bounty Report Templates : Enhancing Efficiency In Vulnerability Reporting

Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They ensure that hackers provide clear,…

1 week ago

FullBypass : A Tool For AMSI And PowerShell CLM Bypass

FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained Language Mode (CLM). By doing…

1 week ago

Carseat : A Python Implementation Of Seatbelt

Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool, Seatbelt. It includes nearly all…

1 week ago

Pyda : A Tool For Dynamic Binary Analysis

Pyda is an innovative tool designed to simplify dynamic binary analysis by allowing developers to write analysis tools in Python.…

1 week ago

AMDVLK : The Power Of Vulkan On AMD GPUs For Linux

The AMD Open Source Driver for Vulkan® (AMDVLK) is a powerful, open-source Vulkan driver developed by AMD for Radeon™ graphics…

1 week ago

Atomic Red Team : Mastering Threat Simulations For Advanced Security Testing

The Atomic Red Team is an open-source framework designed to help security teams emulate adversarial tactics and techniques in alignment…

1 week ago