informationsecurity

Awesome-OpSec : Empowering Digital Safety Through Feminist Cybersecurity And Operational Security

A Feminist Guide to Digital Defense serves as a comprehensive resource for enhancing online safety and privacy through a feminist…

8 months ago

CVE-2024-25153 : A Detailed Guide To Remote Code Execution In Fortra File Catalyst Workflow

This is a proof of concept for CVE-2024-25153, a Remote Code Execution vulnerability in Fortra FileCatalyst Workflow 5.x, before 5.1.6…

8 months ago

Kimsuky PowerShell Backdoor – A Comprehensive Analysis Of Its Commands And Operations

In the shadowy realms of cyber espionage, the Kimsuky PowerShell Backdoor stands as a sophisticated tool designed for stealthy infiltrations…

8 months ago

SpoofCheck – Fortifying Email Defenses By Unmasking Domain Spoofability

A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak…

8 months ago

Awesome Incident Response – Essential Tools And Resources

Digital Forensics and Incident Response (DFIR) teams are groups of people in an organization responsible for managing the response to…

8 months ago

Ansible Role : Bloodhound-CE (Ludus) – A Quick Deployment Guide

An Ansible Role that installs Bloodhound-CE on a debian based system. Checks if {{ ludus_bloodhound_ce_install_path }}/docker-compose.yml exists If not, it installs vanilla…

8 months ago

DetectDee – The Ultimate Guide To Tracing Social Media Profiles

DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing…

8 months ago

Awesome Honeypots : Guardians Of The Digital Frontier – A Comprehensive Guide To Cybersecurity Tools

A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and…

8 months ago

Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques

Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is…

8 months ago

Mali GPU Kernel LPE – Unveiling Root Access Exploits In Google Pixel Devices

This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox,…

8 months ago