informationsecurity

LatLoader – Evading Elastic EDR In Lateral Movement

LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this…

11 months ago

Telegram Explorer (TEx) – The Ultimate Toolkit for Telegram Data Analysis

TEx is a Telegram Explorer tool created to help Researchers, Investigators and Law Enforcement Agents to Collect and Process the…

11 months ago

HackSys Extreme Vulnerable Driver – A Deep Dive into HEVD Exploitation

The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills…

11 months ago

OSGINT – A Deep Dive Into GitHub User Information Retrieval

In the vast realm of GitHub, the ability to glean information about users can be invaluable for various purposes. 'OSGINT:…

11 months ago

Challenges in Proposal Management and How To Overcome Them

Enhancing Proposal Management Proposal management can be a complex task. Companies across all industries face various challenges when managing the…

11 months ago

VTI-Dorks – Mastering Threat Hunting With VirusTotal Queries

Awesome VirusTotal Enterprise Search Queries (formerly Virustotal Intelligence or VTI). In today's evolving cyber landscape, effective threat hunting is paramount.…

11 months ago

CloudGrep – Efficient Direct Search For Logs In Cloud Storage

The innovative solution designed to streamline your search processes in cloud storage. By bypassing traditional log indexing in SIEMs, CloudGrep…

11 months ago

ChopChop – Web Security Testing Tool

ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT. Its goal…

11 months ago

CVE-2023-43770 POC – Unveiling XSS Vulnerability In Roundcube

In the dynamic realm of cybersecurity, vulnerabilities emerge and evolve constantly. The recent discovery of CVE-2023-43770 highlights an alarming Cross-Site…

12 months ago

Building And Configuring – Kernel Exploits On Ubuntu 23.04

In the rapidly evolving landscape of Linux systems, vulnerabilities can emerge that challenge even seasoned developers. 'Building and Configuring: Kernel…

12 months ago