kalilinuxtools

Kimsuky PowerShell Backdoor : An In-Depth Breakdown Of Its Command And Control Framework

We delve into the intricate workings of the Kimsuky PowerShell Backdoor, a sophisticated cyber espionage tool attributed to the notorious…

7 months ago

Mobile Helper Framework – Automate App Analysis And Security Insights

Is a tool that automates the process of identifying the framework/technology used to create a mobile application. Additionally, it assists…

8 months ago

SharpCovertTube – Covert Command Execution Via YouTube

SharpCovertTube is a program created to control Windows systems remotely by uploading videos to Youtube. The program monitors a Youtube…

8 months ago

OpenBSD – Dynamic IP, WireGuard VPN, And Encrypted DNS

This article presents a detailed guide centered around OpenBSD and Linux for enhancing network security through the implementation of dynamic…

8 months ago

CVE-2024-21762 Check – Identifying Vulnerability In FortiGate SSL VPNs

It provides a detailed guide on how to check if a FortiGate SSL VPN is vulnerable to CVE-2024-21762, a critical…

8 months ago

IntelMQ – Boosting Cybersecurity With Automation And Intelligence

IntelMQ is a solution for IT security teams (CERTs & CSIRTs, SOCs abuse departments, etc.) for collecting and processing security feeds…

8 months ago

VMwareCloak – Stealth Mode Enhancement For VM Security To Outsmart Malware

A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying…

8 months ago

Medusa Version 2.4.6 – Elevating Tool Security And Efficiency With Latest Enhancements

A significant update that marks a new milestone in the tool's development. This release brings forth a suite of enhancements…

8 months ago

Windows – Seamless Integration And Management

Explore the innovative approach to running Windows inside a Docker container, offering a streamlined and flexible solution for developers and…

8 months ago

BypassAV – Mastering The Art Of Evading Anti-Virus And EDR Systems

In the constantly evolving landscape of cybersecurity, the ability to discreetly navigate past anti-virus (AV) and Endpoint Detection and Response…

8 months ago