kalilinux

PipeViewer – Exploring Windows Named Pipes For Security And Permissions

PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is…

8 months ago

MetaHub – Revolutionizing Vulnerability Management With Contextual Impact Evaluation

MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management. You can use it with AWS…

8 months ago

Nysm : Unveiling The Art Of Stealthy eBPF Post-Exploitation Containers

In the ever-evolving landscape of cybersecurity, offensive tools based on eBPF (Extended Berkeley Packet Filter) have gained popularity, from credential…

8 months ago

Exploring Best EDR Of The Market (BEOTM) : Unveiling User-Mode Evasion Techniques and Defensive Strategies

BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) project, designed to serve as a testing ground for understanding…

8 months ago

Valid8Proxy: Streamlining Proxy Management for Web Scraping and Network Security

Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for…

8 months ago

CATSploit: Revolutionizing Automated Penetration Testing with Cyber Attack Techniques Scoring (CATS) Method

CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester.…

8 months ago

Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.

The article "Demonized Shell: Advancing Linux Persistence Techniques and Security Implications" goes into great detail about D3m0n1z3dShell, a complex tool…

9 months ago

EDRSilencer: A Tool for Managing EDR Outbound Traffic with Windows Filtering Platform.

Inspired by the closed source FireBlock tool FireBlock from MdSec NightHawk, I decided to create my own version and this tool was…

9 months ago

Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets.

Of course! The piece "Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets" talks about a new tool for…

9 months ago

Red-Teamer Diaries: Insights and Techniques for Effective Penetration Testing

Publicly accessible notes about my pentesting/red teaming experiments tested on several controlled environments/infrastructures that involve playing with various tools and…

9 months ago