ProfileHound
Quando un utente effettua il primo logon su una macchina Windows, il sistema crea un profilo locale (tipicamente in C:UsersNomeUtente). Anche dopo il logout, quel profilo spesso rimane sul disco (salvo policy di cleanup) e può contenere artefatti utili: dati browser (cookie/session), credenziali cached e segreti protetti da DPAPI, ...🕋
Username Anarchy
2024-10-31T11:52:54+00:00By quester PS10n|Categories: ⚔️, Defense, Hacking, Tool|
Sicurezza del Software con gli ELF x86/64
2024-08-26T15:07:13+00:00By quester Rs4rela|Categories: ⚔️, Hacking|
Tienimi aggiornato sulla
prossima “quest” 📩
ve ou
APT-Hunter
2024-01-19T11:36:49+00:00By quester PS10n|Categories: ⚔️, Tool|Tags: Forensic, Incident Response|
Forensicator
2024-01-19T11:36:49+00:00By quester Rs4rela|Categories: ⚔️, Hacking, Tool|Tags: Forensic, Incident Response|
CTF Necromancer – Parte I
2025-04-13T10:11:17+00:00By quester Rs4rela|Categories: ♜, ⚔️, CTF, Hacking, Necro, 🗡️|
CTF Necromancer – Parte II
2025-04-13T10:11:08+00:00By quester Rs4rela|Categories: ♜, ⚔️, CTF, Hacking, Necro, 🗡️|
CTF Necromancer – Parte III
2025-04-13T10:10:49+00:00By quester Rs4rela|Categories: ♜, ⚔️, CTF, Hacking, Necro, 🗡️|
Yara-Scanner_MOD
2024-01-19T11:36:49+00:00By quester Rs4rela|Categories: ⚔️, Hacking, Tool|Tags: Forensic, Incident Response|
Azure Annihilation
2025-03-29T23:49:22+00:00By quester Rs4rela|Categories: ⚔️, Attack, Hacking, Vulnerability|
CyLR
2024-01-19T11:36:49+00:00By quester Rs4rela|Categories: ⚔️, Tool|Tags: Forensic, Incident Response, Penetration Test|
TruffleHog
2024-01-19T11:36:49+00:00By quester PS10n|Categories: ⚔️, Tool|Tags: Forensic, Penetration Test|
Creare un Malware
2024-01-19T11:36:25+00:00By quester Rs4rela|Categories: ⚔️, Hacking|
Lupo – Malware IOC Extractor
2024-01-19T11:36:25+00:00By quester PS10n|Categories: ⚔️, Tool|Tags: Incident Response|






























