In this tutorial you will learn how to uninstall Avira Antivirus from your system, without leaving a single trace of it. Be sure to follow along with this guide, because there are a few small hitches …
Main Content
Yeti – Open Distributed Threat Intelligence
What is this? Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti will also automatically enrich …
Continue Reading about Yeti – Open Distributed Threat Intelligence →
mitmAP – Create Fake AP and Sniff Data
new in 2.0: SSLstrip2 for HSTS bypass Image capture with Driftnet TShark for command line .pcap capture …
Continue Reading about mitmAP – Create Fake AP and Sniff Data →
Automated DLL Enumerator: rattler
Rattler helps identify which application DLL’s are vulnerable to DLL preloading attacks. In a nutshell, DLL preloading attacks allow you to trick applications into loading and executing malicious …
Microsoft CNG/CryptoAPI Tor Protocol Implementation PoC
mini-tor is a proof-of-concept utility for accessing internet content and hidden service content (.onion) via tor routers. this utility is aiming for as smallest size as possible (currently ~47kb, …
Continue Reading about Microsoft CNG/CryptoAPI Tor Protocol Implementation PoC →
Android Remote Administration Tool: AhMyth
Android Remote Administration Tool AhMyth consists of two parts : Server side : desktop application based on electron framework (control panel) Client side : android application (backdoor) …
Continue Reading about Android Remote Administration Tool: AhMyth →