This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices. The following Incident…
In this article, we delve into the intricacies of a recently discovered vulnerability in Google Chrome, identified as CVE-2023-4427. Discovered…
A vulnerability that serves as a bypass for the patched CVE-2023-21839 in Oracle WebLogic. This article delves into the exploit's…
In today's digital landscape, navigating User Account Control (UAC) prompts efficiently across various Windows operating system versions is a critical…
A graphical user interface built on Qt, designed to streamline the configuration and control of Clight and Clightd daemons. With…
We dissect the exploit's mechanisms, shedding light on how it manipulates memory through io_uring. By delving into the technical nuances,…
Retrieving Bitlocker keys from the TPM using SPI, I2C or LPC communications requires an understanding of the specific protocol supported…
Discover the power of H4X-Tools, a versatile toolkit designed for scraping, OSINT (Open-Source Intelligence), and beyond. From extracting information from…
Hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized…
In my first cryptography blogpost I introduced some definitions and concepts, one of them was the concept of substitution ciphers. In short, those…