Little AV/EDR Evasion Lab for training & learning purposes. (????️ under construction..) ____ _ _____ ____ ____ ___ __ _____ _…
GitHub has become an important tool for version control and project management in the ever-changing world of software development and…
The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7…
Microsoft ICS Forensics Tools framework is an open-source forensics framework that enables the analysis of Industrial PLC metadata and project…
Atlassian Companion for macOS has a serious remote code execution vulnerability that was just found. It is called CVE-2023-22524. This…
Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by…
In the realm of cybersecurity, understanding and exploiting Windows APIs is pivotal for both defenders and attackers. In this article,…
With the help of LDAP Ping requests (cLDAP), "LDAP Nom Nom" is a powerful tool that quickly and quietly brute-forces…
Threat identification and analysis are very important for keeping systems and networks safe in the ever-changing world of cybersecurity. YARA…
This is a Python code to detect landmarks, labels and web entities in a set of images using Google Cloud…