The owner of a cryptocurrency wallet associated with Hydra Market refuses to provide police with the password, preventing investigators from…
The owner of a cryptocurrency wallet associated with Hydra Market refuses to provide police with the password, preventing investigators from…
[*] k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters. With k0otkit, you can…
A new zero-day vulnerability in Microsoft Office has been publicly revealed, allowing remote code execution on affected Windows systems. A Microsoft…
A new zero-day vulnerability in Microsoft Office has been publicly revealed, allowing remote code execution on affected Windows systems. A Microsoft…
Labtainers include more than 50 cyber lab exercises and tools to build your own. Import a single VM appliance or…
A tool to help automate common persistence mechanisms. Currently supports Print Monitor (SYSTEM), Time Provider (Network Service), Start folder shortcut…
DeepSleep A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC. Huge thanks to @waldoirc for documenting…
iMonitor iMonitor (Endpoint Behavior Analysis System – Then Open Source Procmon) is an endpoint behavior monitoring and analysis software based on…
Austrian police succeeded in breaking up a group of drug dealers who purchased drugs on the darkweb and resold the…
A tool for automatically converting mitmproxy captures to OpenAPI 3.0 specifications. This means that you can automatically reverse-engineer REST APIs…