informationsecurity

Nightmangle – Cyber Espionage via Telegram’s C2 Agent ExploredNightmangle

Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent, created by @1N73LL1G3NC3. It was developed as Proof of Concept (POC), that…

12 months ago

Script Overview – Decoding GootLoader Payloads And Obfuscations

In the intricate realm of cyber threats, GootLoader emerges as a formidable challenge. This article delves deep into the intricacies…

12 months ago

Wireshark 4.0.10 Released – What’s New!

The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol…

12 months ago

ELFEN – Linux Malware Analysis Sandbox

ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform…

12 months ago

Incident Response Playbooks – Streamlined Security Mitigation Guides

Welcome to the Incident Response Playbooks repository! We're creating these playbooks with the knowledge gained from LetsDefend to assist security experts in…

12 months ago

HyperDbg v0.6-beta: Advanced Debugging & Memory Upgrades

If you’re enjoying HyperDbg, don’t forget to give a star on GitHub! Please visit Build & Install to configure the environment for…

12 months ago

Awesome Command And Control

A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd…

12 months ago

GDBleed – Advanced Binary Instrumentation with GDB

GDBleed - Dynamic-Static binary instrumentation framework on top of GDB GDBleed is a gdb wrapper exposing a set of commands for…

12 months ago

RedPersist – Advanced Windows Persistence in C#

In the evolving landscape of system management, maintaining application persistence is paramount. 'RedPersist' stands out as a robust solution, offering…

12 months ago

Eyes: Email-Centric OSINT Uncovered

Eyes is an OSINT tool that focuses on extracting information related to an email address. Whether you’re a cybersecurity professional,…

12 months ago