A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are…
WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale. This tool enables security…
In the age of digital surveillance and connectivity, access to RTSP (Real-Time Streaming Protocol) streams plays a pivotal role in…
This repository contains various ICS/SCADA/OT focused signatures and analytics. The end goal is to enable Critical Infrastructure Defenders, Intrusion Analysts,…
SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple…
LinikatzV2 is a bash script based on the Linikatz tool developed by time-machine (link). It allows post-exploitation tasks on UNIX…
This is simple scanner for CVE-2023-22515, a critical vulnerability in Atlassian Confluence Data Center and Server that is actively being exploited…
Discovering and securing on-premises Microsoft solutions is paramount in today's cybersecurity landscape. In this article, we delve into 'msprobe,' a…
Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently…
Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF. Dangerzone works like this: You…