Developing the next great app or a fully functional website is something every developer strives for. Crafting lines of code that roll...
Although 5G is faster and more secure than 4G, new research indicates that it still has some vulnerabilities, which poses a certain...
Easier network scanning with NetAss2 (Network Assessment Assistance Framework). Make it easy for Pentester to do penetration testing on network. Dependencies nmap...
On November 12, 2019, Microsoft routinely released a security update for November. The security update covers the Windows operating system, IE/Edge browser,...
SharpHide Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null-terminated) registry key. This...
Subdomain Scan With Ping Method. Flags Value Description –hostname example.com Domain for scan. –output Records the output with the domain name. –list...
One of the two defendants behind the Dream Market vendor account “The Drug Llama” was sentenced in a United States District Court...
apk-mitm A CLI application that automatically prepares Android APK files for HTTPS inspection Inspecting a mobile app’s HTTPS traffic using a proxy...
IMPORTANTWhen using source or by downloading the code directly from the repository, it is important to run the database upgrade script if...
functrace – A function tracer functrace is a tool that helps to analyze a binary file with dynamic instrumentation using DynamoRIO (http://dynamorio.org/). These are some...
ngrev A graphical tool for reverse engineering of Angular projects. It allows you to navigate in the structure of your application and...
A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated....
In the recent GeForce 441.12 release, NVIDIA fixed several undisclosed high-risk vulnerabilities, and these vulnerabilities also existed in Quadro, NVS, and Tesla’s...
ScratchABit ScratchABit is an interactive incremental disassembler with data/control flow analysis capabilities. ScratchABit is dedicated to the efforts of the OpenSource reverse...
Although the JavaScript library jQuery is still being used, it is no longer as popular as it used to be. According to...
RacePWN (Race Condition framework) RacePWN is a librace library and a racepwn utility that are designed to test a race condition attack...
threat_note is a web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related...
From behind bars in a French prison, one of the accused administrators of DeepDotWeb provided his side of the story. Throughout the...
Poseidon Poseidon began as a joint effort between two of the IQT Labs: Cyber Reboot and Lab41. The project’s goal is to explore approaches to...
PowerShell Script to perform a quick AD audit _____ ____ _____ _ _ _| _ | | _ |_ _ _| |_|...
Kamerka-GUI Ultimate Internet of Things/Industrial Control Systems reconnaissance tool The main purpose of the ICS module of ꓘamerka is to map attack...