kalilinux

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript InternalsChrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides foundational insights into browser internals…

4 days ago
Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on a suite of specialized tools…

4 days ago
Full Spectrum Event Tracing For Windows Detection In The kernel Against RootkitsFull Spectrum Event Tracing For Windows Detection In The kernel Against Rootkits

Full Spectrum Event Tracing For Windows Detection In The kernel Against Rootkits

Sanctum EDR demonstrates a multi-layered approach to detecting and preventing Event Tracing for Windows (ETW) tampering by rootkits, combining kernel-mode…

4 days ago
SpyAI : Intelligent Malware With Advanced CapabilitiesSpyAI : Intelligent Malware With Advanced Capabilities

SpyAI : Intelligent Malware With Advanced Capabilities

SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze screenshots from entire monitors. It…

7 days ago
Proxmark3 : The Ultimate Tool For RFID Security And AnalysisProxmark3 : The Ultimate Tool For RFID Security And Analysis

Proxmark3 : The Ultimate Tool For RFID Security And Analysis

The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research, and development. Originally created by…

7 days ago
Awesome Solana Security : Enhancing Program DevelopmentAwesome Solana Security : Enhancing Program Development

Awesome Solana Security : Enhancing Program Development

The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more secure Solana programs. It provides…

7 days ago
IngressNightmare-POCs : Understanding The Vulnerability Exploitation FlowIngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting the NGINX Ingress Controller for…

7 days ago
AdaptixC2 : Enhancing Penetration Testing With Advanced Framework CapabilitiesAdaptixC2 : Enhancing Penetration Testing With Advanced Framework Capabilities

AdaptixC2 : Enhancing Penetration Testing With Advanced Framework Capabilities

AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It offers a robust set of…

7 days ago
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And ObfuscationBincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation

Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation

Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to obfuscate and encrypt ELF binaries…

7 days ago
Endpoint With Missing Agents : Identifying And Managing Security GapsEndpoint With Missing Agents : Identifying And Managing Security Gaps

Endpoint With Missing Agents : Identifying And Managing Security Gaps

Endpoint security is crucial for protecting organizations from cyber threats. However, managing endpoint agents can be challenging, especially when devices…

7 days ago