PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
-
Updated
Sep 26, 2023 - C
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
OSINT Template Engine
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
HardenedBSD implements strong exploit mitigations and security hardening technologies on top of FreeBSD, with a direct focus on the nexus between human rights and information security. HardenedBSD is the first (and only) enterprise operating system to have every part of its public infrastructure accessible by human-rights focused technologies li…
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Localroot-ALL-CVE~
Compromised SSH servers and scraped websites revealed leaked hacking tools.
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the keystrokes.
InfoSec Binary Hex Editor with Retro Disassemblers
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
A simple backdoor for servers and embedded systems.
KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their devices to determine whether they are vulnerable to key reinstallation attacks, or attack those devices.
An example kernel module rootkit to get reverse shell
Created by The cybersecurity community