kalilinux

eBPF File Creation Blocker : Enhancing Linux Security

The eBPF File Creation Blocker is a cutting-edge security module designed to prevent file creation in specified directories using the…

2 days ago

DeepSeek-Vulnerability-Analyzer : Enhancing Burp Suite With AI-Powered Analysis

The DeepSeek-Vulnerability-Analyzer is an innovative extension for Burp Suite that leverages AI-driven capabilities to enhance vulnerability detection and analysis. By…

2 days ago

NFCToolsGUI : A Comprehensive NFC Management Tool

NFCToolsGUI is a versatile, cross-platform program designed to interact with PN532 NFC modules, supporting Windows, Linux, and macOS. It simplifies…

2 days ago

GraphRunner : The Dual-Use Toolset For Microsoft 365 Security

GraphRunner is a powerful post-exploitation toolset designed for interacting with the Microsoft Graph API, enabling red teams and attackers to…

3 days ago

NailaoLoader : Hiding Execution Flow via Patching

NailaoLoader employs sophisticated techniques to obscure its execution flow, leveraging Windows Management Instrumentation (WMI) for lateral movement and file transfer.…

3 days ago

CVE-2025-21333-POC : An In-Depth Exploration Of Windows Kernel Exploitation Techniques

The CVE-2025-21333 Proof of Concept (PoC) demonstrates an exploit targeting a vulnerability in the vkrnlintvsp.sys driver on Windows systems. This…

3 days ago

Powershell Digital Forensics And Incident Response

PowerShell has emerged as a vital tool in Digital Forensics and Incident Response (DFIR), offering robust capabilities for automating data…

3 days ago

Brainstorm : Revolutionizing Web Fuzzing With Local LLMs

Brainstorm is an innovative web fuzzing tool that integrates traditional fuzzing techniques with AI-powered insights, leveraging local Large Language Models…

4 days ago

Vulnerability Research : Harnessing Tools Like Metasploit To Uncover And Mitigate Security Weaknesses

Vulnerability research is a critical aspect of cybersecurity that focuses on identifying, analyzing, and documenting security weaknesses in software, hardware,…

4 days ago

NativeBypassCredGuard : Bypassing Credential Guard With NTAPI Functions

NativeBypassCredGuard is a specialized tool designed to bypass Microsoft's Credential Guard, a security feature that protects sensitive credentials like NTLM…

4 days ago