kalilinux

CVE-2023-4427 – Unveiling Chrome Vulnerability Exploitation And Mitigation Strategies

In this article, we delve into the intricacies of a recently discovered vulnerability in Google Chrome, identified as CVE-2023-4427. Discovered…

2 years ago

CVE-2024-20931 – Bypassing Patched Vulnerabilities In Oracle WebLogic

A vulnerability that serves as a bypass for the patched CVE-2023-21839 in Oracle WebLogic. This article delves into the exploit's…

2 years ago

Automated Multi UAC Bypass – Streamlining Elevation Across Windows Versions

In today's digital landscape, navigating User Account Control (UAC) prompts efficiently across various Windows operating system versions is a critical…

2 years ago

Clight GUI – Empowering Users With A User-Friendly Interface For Brightness Control On Linux

A graphical user interface built on Qt, designed to streamline the configuration and control of Clight and Clightd daemons. With…

2 years ago

io_uring_LPE-CVE-2023-2598 : Analysis Of The Conquering Memory Exploit

We dissect the exploit's mechanisms, shedding light on how it manipulates memory through io_uring. By delving into the technical nuances,…

2 years ago

TPM Sniffing – Unveiling Methods To Retrieve Bitlocker Keys Through Hardware Communication Channels

Retrieving Bitlocker keys from the TPM using SPI, I2C or LPC communications requires an understanding of the specific protocol supported…

2 years ago

H4X-Tools : Empowering OSINT Enthusiasts With A Comprehensive Toolkit

Discover the power of H4X-Tools, a versatile toolkit designed for scraping, OSINT (Open-Source Intelligence), and beyond. From extracting information from…

2 years ago

Hashcat – Unleashing The Power Of The World’s Fastest And Most Advanced Password Recovery Utility

Hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized…

2 years ago

Introduction To Cryptography – The Vigenère Cipher : Racking The Code And Exploring Its Challenges

In my first cryptography blogpost I introduced some definitions and concepts, one of them was the concept of substitution ciphers. In short, those…

2 years ago

LLVM-YX-Callobfuscator : Enhancing Windows x64 Native Call Security At Compile Time

A powerful LLVM plugin designed to bolster the security of Windows x64 native calls during the compilation process. This innovative…

2 years ago