CloudMiner – Unleashing Free Computing Power Within Azure Automation

CloudMiner represents a groundbreaking approach to leveraging Azure Automation service without incurring any costs. Designed for educational and research purposes, this tool cleverly navigates through the service’s upload module/package flow, allowing users to execute code for up to three hours per session, completely free of charge. Despite being reported to Microsoft, the service’s behavior remains […]

February 21, 2024
Read More >>

SqliSniper – Enhancing Web Security By Detecting SQL Injection Vulnerabilities With Python

SqliSniper is a robust Python tool designed to detect time-based blind SQL injections in HTTP request headers. It enhances the security assessment process by rapidly scanning and identifying potential vulnerabilities using multi-threaded, ensuring speed and efficiency. Unlike other scanners, SqliSniper is designed to eliminates false positives through and send alerts upon detection, with the built-in Discord […]

February 21, 2024
Read More >>

NullSection : A Revolutionary Anti-Reversing Tool For Enhancing Software Security

NullSection emerges as a cutting-edge tool designed to fortify software against reverse engineering attempts. By employing a novel technique that overwrites section headers with null bytes, it effectively renders ELF binaries, including potentially malicious .ko rootkits, impervious to analysis by popular decompilers like Ghidra and IDA. This article delves into the installation process, advantages, and […]

February 20, 2024
Read More >>

AzSubEnum – Azure Service Subdomain Enumeration

AzSubEnum is a specialized subdomain enumeration tool tailored for Azure services. This tool is designed to meticulously search and identify subdomains associated with various Azure services. Through a combination of techniques and queries, AzSubEnum delves into the Azure domain structure, systematically probing and collecting subdomains related to a diverse range of Azure services. How It […]

February 20, 2024
Read More >>

B(l)utter: A Tool for Reverse Engineering Flutter Mobile Applications

Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only). Also the application is currently work only against recent Dart versions. For high priority missing features, see TODO Environment Setup This application uses C++20 Formatting library. It requires very recent C++ compiler such as g++>=13, Clang>=15. […]

December 28, 2023
Read More >>

LinikatzV2 – Unveiling UNIX Secrets in Active Directory Environments

LinikatzV2 is a bash script based on the Linikatz tool developed by time-machine (link). It allows post-exploitation tasks on UNIX computers joined to Active Directory, using various methods for credential mining. This tool needs root privileges to be run on the host system. It allows extraction of : Optional : Some of these actions may not produce […]

October 23, 2023
Read More >>

RustHound : A Cross-Platform BloodHound Collector Tool

In the realm of cybersecurity and network reconnaissance, RustHound emerges as a versatile hero. This cross-platform BloodHound collector tool, built with Rust, breaks down the barriers between operating systems, making it a go-to solution for collecting critical network data. Join us on a journey to explore the power and potential of RustHound in enhancing your […]

October 16, 2023
Read More >>

Wireshark 4.0.10 Released – What’s New!

The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol development, network monitoring, communications protocol development, and education. Wireshark has announced version 4.0.10, which includes bug fixes, new improvements, and capabilities for improved packet inspection, making it a top choice for consumers and organizations in […]

October 6, 2023
Read More >>

Cartographer – Advanced Code Coverage Mapping in Ghidra

Introduction There’s no doubt that reverse engineering can be a very complex and confusing matter, even for those that love doing it. Jumping into a program and being greeted with tons of assembly and weirdly-named functions and variables is hardly what most would call a fun time. Not to mention that identifying specific functionality in […]

October 2, 2023
Read More >>