kalilinuxtools

CVE-2023-43770 POC – Unveiling XSS Vulnerability In RoundcubeCVE-2023-43770 POC – Unveiling XSS Vulnerability In Roundcube

CVE-2023-43770 POC – Unveiling XSS Vulnerability In Roundcube

In the dynamic realm of cybersecurity, vulnerabilities emerge and evolve constantly. The recent discovery of CVE-2023-43770 highlights an alarming Cross-Site…

1 year ago
Building And Configuring – Kernel Exploits On Ubuntu 23.04Building And Configuring – Kernel Exploits On Ubuntu 23.04

Building And Configuring – Kernel Exploits On Ubuntu 23.04

In the rapidly evolving landscape of Linux systems, vulnerabilities can emerge that challenge even seasoned developers. 'Building and Configuring: Kernel…

1 year ago
Nightmangle – Cyber Espionage via Telegram’s C2 Agent ExploredNightmangleNightmangle – Cyber Espionage via Telegram’s C2 Agent ExploredNightmangle

Nightmangle – Cyber Espionage via Telegram’s C2 Agent ExploredNightmangle

Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent, created by @1N73LL1G3NC3. It was developed as Proof of Concept (POC), that…

1 year ago
Script Overview – Decoding GootLoader Payloads And ObfuscationsScript Overview – Decoding GootLoader Payloads And Obfuscations

Script Overview – Decoding GootLoader Payloads And Obfuscations

In the intricate realm of cyber threats, GootLoader emerges as a formidable challenge. This article delves deep into the intricacies…

1 year ago
Wireshark 4.0.10 Released – What’s New!Wireshark 4.0.10 Released – What’s New!

Wireshark 4.0.10 Released – What’s New!

The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol…

1 year ago
ELFEN – Linux Malware Analysis SandboxELFEN – Linux Malware Analysis Sandbox

ELFEN – Linux Malware Analysis Sandbox

ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform…

1 year ago
Incident Response Playbooks – Streamlined Security Mitigation GuidesIncident Response Playbooks – Streamlined Security Mitigation Guides

Incident Response Playbooks – Streamlined Security Mitigation Guides

Welcome to the Incident Response Playbooks repository! We're creating these playbooks with the knowledge gained from LetsDefend to assist security experts in…

1 year ago
HyperDbg v0.6-beta: Advanced Debugging & Memory UpgradesHyperDbg v0.6-beta: Advanced Debugging & Memory Upgrades

HyperDbg v0.6-beta: Advanced Debugging & Memory Upgrades

If you’re enjoying HyperDbg, don’t forget to give a star on GitHub! Please visit Build & Install to configure the environment for…

1 year ago
Awesome Command And ControlAwesome Command And Control

Awesome Command And Control

A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd…

1 year ago
GDBleed – Advanced Binary Instrumentation with GDBGDBleed – Advanced Binary Instrumentation with GDB

GDBleed – Advanced Binary Instrumentation with GDB

GDBleed - Dynamic-Static binary instrumentation framework on top of GDB GDBleed is a gdb wrapper exposing a set of commands for…

1 year ago