Delve into the realm of network security with MinDNS, a lightweight DNS server crafted in Rust. Designed for versatility, it…
A formidable tool tailored for both dropper and post-exploitation scenarios on Windows systems. With its sophisticated capabilities including dynamic syscall…
Bypassing Memory Scanners The recent versions of Cobalt Strike have made it so easy for the operators to bypass memory…
Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates. This threat is…
This repository contains multiple PowerShell scripts that can help you respond to cyber attacks on Windows Devices. The following Incident…
In this article, we delve into the intricacies of a recently discovered vulnerability in Google Chrome, identified as CVE-2023-4427. Discovered…
A vulnerability that serves as a bypass for the patched CVE-2023-21839 in Oracle WebLogic. This article delves into the exploit's…
In today's digital landscape, navigating User Account Control (UAC) prompts efficiently across various Windows operating system versions is a critical…
A graphical user interface built on Qt, designed to streamline the configuration and control of Clight and Clightd daemons. With…
We dissect the exploit's mechanisms, shedding light on how it manipulates memory through io_uring. By delving into the technical nuances,…