kalilinuxtools

TrickDump – Evading Detection With Advanced Memory Dump Techniques

TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the…

2 months ago

Red-Teaming-TTPs : A Comprehensive Guide o Tools, Techniques, And Resources

This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…

2 months ago

100 Red Team Projects – A Comprehensive Guide For Pentesters And Network Managers

Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students…

2 months ago

DriverJack – Exploiting NTFS Techniques For Covert Driver Loading

DriverJack is a tool designed to load a vulnerable driver by abusing lesser-known NTFS techniques. These method bypass the registration of…

2 months ago

SCCM HTTP Looter – A Deep Dive Into Exploiting Microsoft SCCM via HTTP

SCCM distribution points (DPs) are the servers used by Microsoft SCCM to host all the files used in software installs,…

2 months ago

SHIMME – Manipulating Shim And Office For Code Injection

In the ever-evolving landscape of cybersecurity, DEFCON 32 unveiled pioneering tools that challenge traditional security paradigms. The "ShimMe" talk introduced…

2 months ago

Nipe – Pioneering Privacy And Anonymity On The Internet With Tor

The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…

2 months ago

Project Apeman : A Comprehensive Guide To Graph-Based AWS Security Analysis

Project Apeman is an advanced tool for security professionals, designed to streamline the analysis of AWS environments using a graph-based…

2 months ago

TCA – A Comprehensive Toolkit For Code Analysis And Quality Assurance

Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis…

2 months ago

2024-PocLib : Comprehensive Vulnerability And Security Exploit Overview

The 2024-PocLib project serves as a crucial resource for cybersecurity enthusiasts and researchers, offering a detailed compilation of the latest…

3 months ago