Evade EDR’s the simple way, by not touching any of the API’s they hook. Theory I’ve noticed that most EDRs …


Evade EDR’s the simple way, by not touching any of the API’s they hook. Theory I’ve noticed that most EDRs …

Tool for obfuscating PowerShell scripts written in Go. The main objective of this program is to obfuscate PowerShell code to …

ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again. Another way to make an LKM visible is using the imperius trick: https://github.com/MatheuZSecurity/Imperius …

DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more. What …

Cybersecurity refers to practices designed to defend computers, mobile devices, electronic data storage platforms and networks against attacks such as …

Malware refers to any form of malicious software which aims to disrupt, harm or steal private information for criminal use. …

Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok …

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, …

Tool for Fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage 🙂 Its main …

A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only. …