informationsecurity

Sleeper – Revolutionizing Data Management With Serverless, Scalable Key-Value Stores

Sleeper is a serverless, cloud-native, log-structured merge tree based, scalable key-value store. It is designed to allow the ingest of…

11 months ago

Stroom – A Robust Platform For Data Processing, Storage, And Analysis

Stroom is a data processing, storage and analysis platform. It is scalable - just add more CPUs / servers for…

11 months ago

Gaffer – The Versatile Graph Database Framework

Gaffer is a graph database framework. It allows the storage of very large graphs containing rich properties on the nodes…

11 months ago

Local KDC For Windows – Implementing Kerberos Authentication Without Domain Membership

This is an example program that can run a Kerberos Key Distribution Center (KDC) on a Windows host and have…

11 months ago

Checking PCAP Data – Essential Tools And Methods For Cybersecurity Analysis

In this guide, we delve into the essentials of checking PCAP data for cybersecurity professionals. Learn how to effectively use…

11 months ago

Hardware YAML DSL – A Guide To Specifications

In the ever-evolving landscape of cybersecurity, the configuration and management of hardware profiles are crucial for effective security protocols. The…

11 months ago

Exploit YAML DSL – Advanced Configurations For Bluetooth Vulnerability Testing

Dives into the intricate world of YAML-based Domain Specific Language (DSL) used for defining and managing exploits in security testing…

11 months ago

Contributing Your Work – A Guide To Submitting Exploits On GitHub

To contribute your work to the project you need to create a pull request on the Github where it is…

11 months ago

Bypass Bot Detection – Enhancing Burp Suite With TLS Cipher Mutation

In the ever-evolving landscape of cybersecurity, staying ahead of detection mechanisms is crucial. This article explores a Burp Suite extension…

11 months ago

Adding An Exploit – How To Integrate And Manage New Exploits In BlueToolkit

To add an exploit one has to go through a similar process as with the hardware profile, but in the…

11 months ago