capture the flag

2024-09-25

Capture The Flag (CTF) is a cybersecurity-focused game where teams compete against each other to capture “flags” that are hidden within ...

Read More

CyberChef

2024-09-25

CyberChef is “The Cyber Swiss Army Knife”. It is an open-source tool developed by the GHCQ often used in a cybersecurity context for ...

Read More

directory information services

2024-09-25

A directory is a database that is used for storing information about users.

An example of a directory is a phone book.

Read More

IPS

2024-09-25

Intrusion Prevention Systems are defensive cybersecurity software that monitor for and block malicious activity.

Read More

kmatryoyshka

2024-09-25

kmatryoyshka is an LKM loader written by Ilya V Matveychikov

https://github.com/milabs/kmatryoshka

Read More

Leo Tolstoy

2024-09-25

Leo Tolstoy was a Russian author. Tolstoy is one of the most influential authors of all time.

https://en.wikipedia.org/wiki/Leo_Tolstoy

Read More

loader

2024-09-25

Loaders in a malware context are specialized malware that deliver additional payloads, often by non-traditional means an with an anti-forensics ...

Read More

RAM

2024-09-25

Random Access Memory (RAM) is short-term memory used by a computer.

Read More

VPN

2024-09-25

Virtual Private Networks is a computer networking method that virtually extends a network to one or more networks, often providing encryption and ...

Read More

borges2021

2024-09-24

Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

by Dan Borges

Packt Publishing ...

Read More