capture the flag
2024-09-25
Capture The Flag (CTF) is a cybersecurity-focused game where teams compete against each other to capture “flags” that are hidden within ...
Read More
CyberChef
2024-09-25
CyberChef is “The Cyber Swiss Army Knife”. It is an open-source tool developed by the GHCQ often used in a cybersecurity context for ...
Read More
directory information services
2024-09-25
A directory is a database that is used for storing information about users.
An example of a directory is a phone book.
Read More
IPS
2024-09-25
Intrusion Prevention Systems are defensive cybersecurity software that monitor for and block malicious activity.
Read More
kmatryoyshka
2024-09-25
kmatryoyshka is an LKM loader written by Ilya V Matveychikov
https://github.com/milabs/kmatryoshka
Read More
Leo Tolstoy
2024-09-25
Leo Tolstoy was a Russian author. Tolstoy is one of the most influential authors of all time.
https://en.wikipedia.org/wiki/Leo_Tolstoy
Read More
loader
2024-09-25
Loaders in a malware context are specialized malware that deliver additional payloads, often by non-traditional means an with an anti-forensics ...
Read More
RAM
2024-09-25
Random Access Memory (RAM) is short-term memory used by a computer.
Read More
VPN
2024-09-25
Virtual Private Networks is a computer networking method that virtually extends a network to one or more networks, often providing encryption and ...
Read More
borges2021
2024-09-24
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
by Dan Borges
Read More