A Feminist Guide to Digital Defense serves as a comprehensive resource for enhancing online safety and privacy through a feminist…
This is a proof of concept for CVE-2024-25153, a Remote Code Execution vulnerability in Fortra FileCatalyst Workflow 5.x, before 5.1.6…
In the shadowy realms of cyber espionage, the Kimsuky PowerShell Backdoor stands as a sophisticated tool designed for stealthy infiltrations…
A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak…
Digital Forensics and Incident Response (DFIR) teams are groups of people in an organization responsible for managing the response to…
An Ansible Role that installs Bloodhound-CE on a debian based system. Checks if {{ ludus_bloodhound_ce_install_path }}/docker-compose.yml exists If not, it installs vanilla…
DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing…
A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and…
Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is…
This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox,…