informationsecurity

InvisibilityCloak – A Game-Changer In C# Post-Exploitation Tools

Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project. Change…

1 year ago

Awesome-BEC – Unveiling A Comprehensive Resource For Business Email Compromise Investigations

A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains…

1 year ago

SharpVeeamDecryptor – Unlocking The Secrets Of Veeam

Decrypt Veeam database passwords. Needs to be run from an elevated context on the Veeam Backup/Database Server. I did not…

1 year ago

Honeypots Detection – Using Nuclei Templates For Effective Detection

Nuclei templates for honeypots detection. This repository contains Nuclei templates to detect several well-known open-source honeypots, such as: ADBHoney, Conpot,…

1 year ago

Callstack Spoofing + Indirect Syscalls POC – Unmasking Evasion Techniques In A Proof Of Concept (POC) Scenario

This project consists of a simple C++ self-Injecting dropper focused on EDR evasion POC. To implement it, I have combined…

1 year ago

Install And Secure – A Guide To Using ‘ldeep’ With Kerberos For Advanced Active Directory Analysis

In the realm of network security and Active Directory assessment, efficient reconnaissance is paramount. This article explores the installation and…

1 year ago

LdrLibraryEx – A Lightweight x64 Library For Loading DLLs Into Memory

A small x64 library to load dll's into memory. n the world of software development, efficient DLL loading is a…

1 year ago

GCR – Google Calendar RAT

Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those…

1 year ago

Technical Analysis Of BiBi – Windows Wiper Targeting Israeli Organizations

On 30th October, Security Joes Incident Response team discovered a new Linux Wiper named "BiBi-Linux" Wiper been deployed by Pro-Hamas Hacktivist group to destroy…

1 year ago

Exploring Tunneling Solutions – A Comprehensive Guide For Self-Hosters And Developers

The purpose of this list is to track and compare tunneling solutions. This is primarily targeted toward self-hosters and developers…

1 year ago