informationsecurity

VTI-Dorks – Mastering Threat Hunting With VirusTotal Queries

Awesome VirusTotal Enterprise Search Queries (formerly Virustotal Intelligence or VTI). In today's evolving cyber landscape, effective threat hunting is paramount.…

1 year ago

CloudGrep – Efficient Direct Search For Logs In Cloud Storage

The innovative solution designed to streamline your search processes in cloud storage. By bypassing traditional log indexing in SIEMs, CloudGrep…

1 year ago

ChopChop – Web Security Testing Tool

ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT. Its goal…

1 year ago

CVE-2023-43770 POC – Unveiling XSS Vulnerability In Roundcube

In the dynamic realm of cybersecurity, vulnerabilities emerge and evolve constantly. The recent discovery of CVE-2023-43770 highlights an alarming Cross-Site…

1 year ago

Building And Configuring – Kernel Exploits On Ubuntu 23.04

In the rapidly evolving landscape of Linux systems, vulnerabilities can emerge that challenge even seasoned developers. 'Building and Configuring: Kernel…

1 year ago

Nightmangle – Cyber Espionage via Telegram’s C2 Agent ExploredNightmangle

Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent, created by @1N73LL1G3NC3. It was developed as Proof of Concept (POC), that…

1 year ago

Script Overview – Decoding GootLoader Payloads And Obfuscations

In the intricate realm of cyber threats, GootLoader emerges as a formidable challenge. This article delves deep into the intricacies…

1 year ago

Wireshark 4.0.10 Released – What’s New!

The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol…

1 year ago

ELFEN – Linux Malware Analysis Sandbox

ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform…

1 year ago

Incident Response Playbooks – Streamlined Security Mitigation Guides

Welcome to the Incident Response Playbooks repository! We're creating these playbooks with the knowledge gained from LetsDefend to assist security experts in…

1 year ago