informationsecurity

ExecIT – Unveiling A Fileless Execution Technique Ith Undetectable DLL Shellcode

DLL Shellcode self-inyector/runner based on HWSyscalls, ideally thought to be executed with rundll32. May grant fileless execution if victim endpoint…

10 months ago

C++ Standard Library And Qt, Python, etc. Implementation in C – Reviving the Spirit of C For Enhanced Development

This project aims to reimplement the C++ standard library functionality using the C programming language. It provides C developers with…

10 months ago

Awesome GPTs (Agents) For Cybersecurity – The Ultimate Guide

The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity…

10 months ago

VPS-Bug-Bounty-Tools : Automating Web Security Tools Installation

Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty. Usage: cd…

10 months ago

Stardust – A Deep Dive Into A 64-Bit Position Independent Implant Template

An modern 64-bit position independent implant template. raw strings global instance compile time hashing #include <Common.h> #include <Constexpr.h> FUNC VOID…

10 months ago

Automated Emulation – Building A Customizable Breach And Attack Simulation Lab With AWS And Terraform

Automated Emulation is a simple terraform template creating a customizable and automated Breach and Attack Simulation lab. It automically builds…

10 months ago

CVE-2023-22527 in Confluence : A Step-by-Step Guide And Its Implications

In the world of cybersecurity, staying informed about the latest vulnerabilities is crucial. One such vulnerability that has garnered attention…

10 months ago

Wormhole Connect – Navigating The Ecosystem For Simplifying Cross-Chain Integration

Wormhole Connect is a project to facilitate integration with the Wormhole protocol. It is thus far comprised of 3 components:…

10 months ago

YaraDbg – Simplifying Yara Rule Development And Analysis For Security Analysts

YaraDbg is a free web-based Yara debugger to help security analysts to write hunting or detection rules with less effort…

10 months ago

OpenVoice – Advancing Voice Cloning Technology

In the ever-evolving world of voice technology, OpenVoice stands as a game-changer. This groundbreaking platform, developed by a team of…

10 months ago