informationsecurity

DotNet-MetaData : A Deep Dive Into .NET Malware Analysis

"DotNet-MetaData: A Deep Dive into .NET Malware Analysis" unveils the advanced techniques for analyzing and classifying .NET-based malware. With a…

10 months ago

BlueSpy – PoC To Record Audio From A Bluetooth Device

This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without…

10 months ago

FinalRecon : The Ultimate All-In-One Web Reconnaissance Tool

FinalRecon is an all in one automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target…

10 months ago

ArtifactCollector : Unlocking Digital Forensics – A Comprehensive Guide

The artifactcollector project provides a software that collects forensic artifacts on systems. These artifacts can be used in forensic investigations…

10 months ago

VolWeb – Empowering Digital Forensics With Advanced Memory Analysis Tools

VolWeb is a digital forensic memory analysis platform that leverages the power of the Volatility 3 framework. It is dedicated…

10 months ago

Awesome Prompt Injection – Understanding And Mitigating AI Model Vulnerabilities

'Awesome Prompt Injection' delves into the intricate world of machine learning vulnerabilities, spotlighting the cunning exploits known as prompt injections.…

10 months ago

Awesome Security Card Games – Mastering Cybersecurity Through Play

Security card games help train your skills and enable discussions for various areas of security. Mastering Cybersecurity Through Play,' your…

10 months ago

Awesome Password Cracking : Unlocking The Code – A Comprehensive Guide To Tools And Techniques

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in…

10 months ago

Perfect DLL Proxy – Streamlining DLL Hijacking With Absolute Path Forwarding

In the complex landscape of cybersecurity, DLL hijacking stands out as a notable technique for exploiting software vulnerabilities. This article…

10 months ago

v9.8.0 – Catch ‘Em All: Network Vulnerabilities : A Deep Dive Into The Latest Nuclei Templates Release

We're thrilled to share that with the launch of Nuclei Templates version 9.8.0, we've broadened our scope in network security…

10 months ago