Search results

  1. Prapattimynk

    From Day Zero to Zero Day 2025-02-16

    Vulnerability research is one of the most effective ways to prevent zero-day attacks, making it a highly sought-after skill set in the cybersecurity realm. This book is designed to help newcomers navigate the intersection of disciplines needed to find unknown security flaws before they can be...
  2. Prapattimynk

    Grep subdomains from web pages

    grepsubsfromwebpages Chrome extension to extract subdomains from webpages that you visit. Installation download from release https://github.com/hackersthan/grepsubsfromwebpages/releases/download/v1.0/grepsubsfromwebpages.zip and extact. open all extensions in chrome based browser...
  3. Prapattimynk

    MEDUSA - Binary instrumentation framework based on FRIDA

    MEDUSA is an extensible and modularized framework that automates processes and techniques practiced during the dynamic analysis of Android and iOS Applications. Installation Clone this repo Navigate to the medusa's directory Run the following command: pip install -r requirements.txt Using...
  4. Prapattimynk

    NFCGate - An NFC research toolkit application for Android

    NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer protocols or assess the security of protocols against traffic modifications. Notice This application was developed for security research purposes by...
  5. Prapattimynk

    Injecting Malicious Code into PDF Files and Creating a PDF Dropper

    Introduction PDF files are often considered static documents by most people. However, the PDF standard allows for the execution of JavaScript code within the document. This feature offers various attack vectors that can be used for Red Team tests and cybersecurity research. In this article, we...
  6. Prapattimynk

    Advanced Cross-Site Scripting (XSS) Attacks, Payloads And Bypass Technics

    Cross-Site Scripting (XSS) is a prevalent security vulnerability typically found in web applications. It allows attackers to inject malicious client-side scripts into web pages viewed by other users. While basic XSS attacks are well-understood, advanced XSS attacks can be more complex and harder...
  7. Prapattimynk

    Top 10 Burpsuite Extensions You Must Know in 2025

    Burp Suite is a widely recognized web application security testing tool that has gained immense popularity among security professionals. With its robust features and extensibility, Burp Suite provides an arsenal of tools to identify and exploit vulnerabilities in web applications. One of the...
  8. Prapattimynk

    Desktop environment in the browser - daedalOS

    System 🧠 File System File Explorer Back, Forward, Recent locations, Up one level, Address bar, Search Thumbnail & Details Views Drag & Drop File Support (internal & external) Loading progress dialog ZIP (write support), ZIP/ISO read support, 7Z/GZ/RAR/TAR/etc. extract support Writes to...
  9. Prapattimynk

    Nexterm - Server management software for SSH, VNC & RDP

    🤔 What is Nexterm? Nexterm is an open-source server management software that allows you to: Connect remotely via SSH, VNC and RDP Manage files through SFTP Deploy applications via Docker Manage Proxmox LXC and QEMU containers Secure access with two-factor authentication 🚀 Run preview You can...
  10. Prapattimynk

    Kalmia - A documentation CMS written in go

    Kalmia is a Go tool with a web interface for managing RsPress documentation. It supports multiple versions, multiple users, and includes a markdown editor for easy edits. Please visit our website for more information on how to use Kalmia and its features. Requirements Go >= 1.22 Node.js...
  11. Prapattimynk

    ConvertX - Self-hosted online file converter Supports 1000+ formats

    A self-hosted online file converter. Supports over a thousand different formats. Written with TypeScript, Bun and Elysia. Features Convert files to different formats Process multiple files at once Password protection Multiple accounts Converters supported ConverterUse caseConverts...
  12. Prapattimynk

    LLM4CVE: Enabling Iterative Automated Vulnerability Repair with Large Language Models

    Prapattimynk submitted a new resource: LLM4CVE: Enabling Iterative Automated Vulnerability Repair with Large Language Models - LLM4CVE: Enabling Iterative Automated Vulnerability Repair with Large Language Models Read more about this resource...
  13. Prapattimynk

    LLM4CVE: Enabling Iterative Automated Vulnerability Repair with Large Language Models 2025-02-14

    Software vulnerabilities continue to be ubiquitous, even in the era of AI-powered code assistants, advanced static analysis tools, and the adoption of extensive testing frameworks. It has become apparent that we must not simply prevent these bugs, but also eliminate them in a quick, efficient...
  14. Prapattimynk

    How to test WiFi penetration with Pixiewps

    It is a hacking tool that exploits weaknesses in the WPS protocol found in routers. This tool is used to recover the WPS PIN key faster than traditional attacks such as Brute Force. Pixiewps relies on analyzing data collected from the network, such as EAPOL (Authentication Protocol) and M1-M8...
  15. Prapattimynk

    Preparing for a Linux interview? Don't go in unprepared

    Prapattimynk submitted a new resource: Preparing for a Linux interview? Don't go in unprepared - Preparing for a Linux interview? Don't go in unprepared Read more about this resource...
  16. Prapattimynk

    Preparing for a Linux interview? Don't go in unprepared 2025-02-13

    If you're looking for real-world, scenario-based Linux interview questions, this document is a goldmine. With 250 practical questions and answers, it covers everything from: Troubleshooting commands File & process management Networking & security configurations System performance monitoringl...
  17. Prapattimynk

    Living Off The Tunnels

    Living Off The Tunnels a.k.a LOTTunnels Project is community driven project to document digital tunnels that can be abused by threat actors as well by insiders for data exfiltrations, persistence, shell access etc. Special thanks to all the contributors as this would not be possible without...
  18. Prapattimynk

    Active Directory Kill Chain Attack & Defense

    Summary This document was designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise active directory and guidance to mitigation, detection, and prevention. And understand Active...
  19. Prapattimynk

    Introduction to Malware Analysis and Reverse Engineering

    CS6038/CS5138 Malware Analysis Department of Electrical Engineering and Computing Systems College of Engineering and Applied Science University of Cincinnati Meets every Tue/Thu in 3210 RECCENTER @ 4:00PM-5:20PM Want to participate?: Apply to Graduate School Here This class will introduce the...
  20. Prapattimynk

    Game Exploit That Lets Hackers Take Over Your PC

    Intro Security vulnerabilities in online games aren't just theoretical - they happen more often than you'd think. Recently, I discovered a Remote Code Execution (RCE) exploit in Marvel Rivals that could allow an attacker on the same network to run arbitrary code on another player's device. The...
Back
Top