Advertisement · 728 × 90

Posts by Hyde

Preview
GitHub - range42/range42: RANGE42 – Main repository and entry point for setup and deployment on your Proxmox nodes RANGE42 – Main repository and entry point for setup and deployment on your Proxmox nodes - range42/range42

Looking for an open-source cyber range solution?

We'are building one ; designed for hands-on security training, community-driven, and freely available. Still a work progress bur Take a look github.com/range42/rang...

2 weeks ago 1 0 0 0
Preview
GitHub - digisquad-repo/kunai-rules: 200+ behavioral detection rules for Kunai (Linux eBPF). Covers MITRE ATT&CK with 92 techniques across execve, connect, DNS, file ops, ptrace, BPF, and more. Ready-... 200+ behavioral detection rules for Kunai (Linux eBPF). Covers MITRE ATT&CK with 92 techniques across execve, connect, DNS, file ops, ptrace, BPF, and more. Ready-to-use profiles for servers an...

Psst... If something malicious runs on your Linux system, would you notice? Most of the time, it just looks like normal activity. That's usually where detection falls apart. I've been updating my Kunai rules to make that easier to spot. The repository now has 200+ rules.

github.com/digisquad-re...

2 weeks ago 0 0 0 0
Preview
LinkPro: eBPF rootkit analysis LinkPro: eBPF rootkit analysis

Ebpf rootkit analysis - www.synacktiv.com/en/publicati...

6 months ago 1 0 0 0
Preview
PromptIntel - IoPC Registry A collaborative threat intelligence platform for tracking and defending against adversarial AI prompts. Discover Indicators of Prompt Compromise (IoPC) and protect your AI systems.

collaborative threat intel platform to identify patterns and artifacts indicating potential exploitation or misuse of Large Language Models - promptintel.novahunting.ai/feed

6 months ago 0 0 0 0
BYOVD to the next level (part 2) — rootkit like it's 2025 - Quarkslab's blog Bring Your Own Vulnerable Driver (BYOVD) is a well-known post-exploitation technique used by adversaries. This blog post is part of a series. In part one we saw how to abuse a vulnerable driver to gai...

Bring Your Own Vulnerable Driver (BYOVD) part 2 - blog.quarkslab.com/exploiting-l...

6 months ago 0 0 0 0

Pixnapping: Bringing Pixel Stealing out of the Stone Age - www.pixnapping.com/pixnapping.pdf

6 months ago 0 0 0 0
Post image

PhishingSecLists

Github repo with wordlists for #phishing domains investigations:

Wizard.txt - common filenames/directories where they might be saving credentials
Shells.txt - popular shell file names

github.com/spmedia/Phis...

Contributor twitter.com/Edmond_Major

1 year ago 10 3 0 0
Preview
Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware Attackers exploit Microsoft Teams calls to deploy DarkGate malware via AnyDesk. Security measures urged.

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware thehackernews.com/2024/12/atta...

1 year ago 0 1 0 0
Advertisement
Preview
From the ReverseEngineering community on Reddit: “DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising Explore this post and more from the ReverseEngineering community

“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising www.reddit.com/r/ReverseEng...

1 year ago 2 1 0 0
Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)
Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty) YouTube video by STÖK

This is still one of my favorite vids for understanding and finding IDOR vulnerabilities by @stokfredrik.bsky.social. It was the video that inspired me to dive in and get the basics of the idea!

www.youtube.com/watch?v=3K1-...

1 year ago 17 2 1 0
Video

Pro-tip: gron is awesome for diffing JSON 🥰

github.com/tomnomnom/gron

1 year ago 104 29 3 0
VIM tutorial: linux terminal tools for bug bounty pentest and redteams with @tomnomnom
VIM tutorial: linux terminal tools for bug bounty pentest and redteams with @tomnomnom YouTube video by STÖK

I've done a whole bunch of talks, interviews and stuff on other people's YouTube channels over the years so I'm going to try and catalog them here.

First up is a video with my good friend STÖK in which I demo some big bounty workflow stuff.

This one is special.

youtu.be/l8iXMgk2nnY

1 year ago 59 16 3 1
Post image

DarkFlare - TCP-over-CDN Tunnel : A stealthy command line tool to create TCP-over-CDN(http) tunnels that keep your connections cozy and comfortable (Now with public test relay servers! ) : github.com/doxx/darkflare

1 year ago 0 1 0 0
Post image

fakebrowser : Fake fingerprints to bypass anti-bot systems (Simulate mouse and keyboard operations to make behavior like a real person ) : github.com/kkoooqq/fake...

1 year ago 0 1 0 0
Preview
GitHub - D4Vinci/Scrapling: Undetectable, Lightning-Fast, and Adaptive Web Scraping for Python Undetectable, Lightning-Fast, and Adaptive Web Scraping for Python - D4Vinci/Scrapling

Scrapling : Undetectable, Lightning-Fast, and Adaptive Web Scraping for Python : github.com/D4Vinci/Scra... credits @D4Vinci1

1 year ago 3 3 0 0
Advertisement