informationsecurity

Awesome Honeypots : Guardians Of The Digital Frontier – A Comprehensive Guide To Cybersecurity Tools

A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and…

10 months ago

Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques

Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is…

10 months ago

Mali GPU Kernel LPE – Unveiling Root Access Exploits In Google Pixel Devices

This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox,…

10 months ago

v2.3.0 – Enhanced Runtime Display And Custom Configurations In Naabu

In the latest software evolution, version 2.3.0 marks a significant milestone for Naabu, introducing key enhancements that users have eagerly…

10 months ago

DarkGPT : A Step-By-Step Installation Guide For Interacting With Leaked Databases

DarkGPT unveils the shadowy corners of cyberspace by granting access to leaked databases through a cutting-edge AI powered by GPT-4-200K.…

10 months ago

Awesome Hacking – An Amazing Project : The Ultimate Resource Guide For Cybersecurity Exploration

A curated list of awesome Hacking. Inspired by awesome-machine-learning If you want to contribute to this list (please do), send me…

10 months ago

The Spy’s Job – Mastering OSINT With XDeadHackerX’s Comprehensive Toolkit

Buenas, soy XDeadHackerX y quiero presentaros mi nueva herramienta llamada The_Spy´s_Job.  Esta Tool está enfocado al OSINT de casi todos los ámbitos (Personas, Nicknames, Redes Sociales,…

10 months ago

WinSOS – Harnessing Trusted Binaries For Stealthy DLL Hijacking

WinSOS represents a sophisticated technique that turns the Windows operating system's own features against it. By manipulating executables in the…

10 months ago

LocalSend – The Ultimate Guide To Secure, Local Network Communication

LocalSend is a free, open-source app that allows you to securely share files and messages with nearby devices over your…

10 months ago

BackupCreds – Mastering Credential Dumping In Windows

BackupCreds presents a groundbreaking method for security professionals to exploit SeTrustedCredmanAccessPrivilege, enabling the dumping of stored credentials in Windows environments.…

10 months ago