informationsecurity

Maestro – Revolutionizing Remote Operations With Seamless Azure Integratio

In the evolving landscape of cybersecurity, the ability to conduct sophisticated post-exploitation operations discretely and efficiently is paramount. Enter Maestro,…

11 months ago

CVE-2024-38077 : A Zero-Click RCE Threat In Windows Server 2025

Earlier this year, we conducted an in-depth analysis of the Windows Remote Desktop Services. Multiple vulnerabilities were discovered, and all…

11 months ago

TrickDump – Evading Detection With Advanced Memory Dump Techniques

TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…

11 months ago

Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources

This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…

11 months ago

100 Red Team Projects – A Comprehensive Guide For Pentesters And Network Managers

Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students…

11 months ago

DriverJack – Exploiting NTFS Techniques For Covert Driver Loading

DriverJack is a tool designed to load a vulnerable driver by abusing lesser-known NTFS techniques. These method bypass the registration of…

11 months ago

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…

11 months ago

SHIMME – Manipulating Shim And Office For Code Injection

In the ever-evolving landscape of cybersecurity, DEFCON 32 unveiled pioneering tools that challenge traditional security paradigms. The "ShimMe" talk introduced…

11 months ago

Nipe – Pioneering Privacy And Anonymity On The Internet With Tor

The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…

11 months ago

Project Apeman : A Comprehensive Guide To Graph-Based AWS Security Analysis

Project Apeman is an advanced tool for security professionals, designed to streamline the analysis of AWS environments using a graph-based…

11 months ago