-
Write-up for Huntress CTF 2025 'No Limits' challenge, explaining how to bypass seccomp sandboxing by exploiting process behavior and leveraging Linux system calls.
Python UpdatedNov 7, 2025 -
A vulnerability in Microsoft 365 Copilot allows bypassing file extension restrictions. This repository includes documentation, proof-of-concept, and disclosure details.
UpdatedSep 20, 2025 -
-
Creating custom tooling for application testing using Burp Plugins.
-
Volt-Typhoon-Write-up Public
Scenario: The SOC has detected suspicious activity indicative of an advanced persistent threat (APT) group known as Volt Typhoon, notorious for targeting high-value organizations. Assume the role o…
1 UpdatedMay 20, 2025 -
-
torghost Public archive
Forked from SusmithKrishnan/torghostTorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables u…
Python GNU General Public License v3.0 UpdatedMay 18, 2025 -
-
-
De-bloat Windows Server 2025
PowerShell UpdatedFeb 7, 2025 -
RemoveAppx-AllUsers Public
For those like me who could not find it on Google, here is how to remove all Microsoft Applications for All System Users.