LATEST ARTICLES

Kali Linux 2024.4 Released, What’s New?

0

Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and new features for cybersecurity professionals and ethical hackers. Here are the key highlights: New Default Python Version Python 3.12 is now the default Python interpreter in Kali Linux 2024.4 1. This change comes with improved performance, better syntax, and optimized memory management. Notably, pip is now disabled...

Lifetime-Amsi-EtwPatch : Disabling PowerShell’s AMSI And ETW Protections

0

This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for Windows) and AMSI (Antimalware Scan Interface) protections. In the realm of cybersecurity, evading detection is often as critical as the attack itself. The 'Lifetime-Amsi-EtwPatch' tool is a sophisticated piece of software designed specifically for this purpose. Developed by codepulze, also known as evilbytecode, this Go...

GPOHunter – Active Directory Group Policy Security Analyzer

0

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory Group Policy Objects (GPOs). It automates security checks and provides detailed reports on potential vulnerabilities, helping administrators secure their environments. Features Connects to Active Directory using LDAP/LDAPS protocols. Supports NTLM authentication and Pass-the-Hash techniques. Analyzes all GPOs within the domain. Identifies and reports security misconfigurations. Displays affected organizational units (OUs)...

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection & Protection

0
2024 MITRE ATT&CK Evaluation

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments up and running. To guard against cyber threats and prevent data breaches, it’s vital to understand the current cybersecurity vendor landscape and continually assess the effectiveness of available solutions. Luckily, the 2024 MITRE ATT&CK Evaluation the most widely trusted...

SecHub : Streamlining Security Across Software Development Lifecycles

0

The free and open-source security platform SecHub, provides a central API to test software with different security tools. SecHub supports many free and open-source as well as proprietary security tools. SecHub Features: Easy to use Scan using one API/client Single human readable report Mark findings as false-positive Supports many security tools Provides IDE and text editor plugins Supported Security Tools: Code scanners Secrets scanners Web scanners Infrastructure scanners License scanners Getting Started SecHub Getting...

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

0

Don't worry if there are any bugs in the tool, we will try to fix them. This OSINT tool has been created to assist cybersecurity professionals, law enforcement, and security researchers in conducting legal and ethical investigations on email addresses, in compliance with applicable laws. Any malicious use, such as harassment, fraud, or illegal activities, is strictly prohibited. TOR66 I have...

hrtng IDA Plugin : Elevating IDA’s Capabilities For Advanced Malware Analysis

0

hrtng IDA plugin is a collection of tools, ideas and experiments from different sources I've found interesting and useful in my reversing work. A practical guide to the reverse of a complex malware using the example of dissecting a FinSpy module with help of hrtng IDA plugin on securelist There is no one place in menu where all functionality of the...

DarkFlare : Bypassing Censorship With TCP-Over-CDN Technology

0

A stealthy command line tool to create TCP-over-CDN(http) tunnels that keep your connections cozy and comfortable. Now with public test relay servers! What Is This Sorcery? DarkFlare is a clever little tool that disguises your TCP traffic as innocent HTTPS requests, letting them pass through corporate firewalls like a VIP at a nightclub. It's like a tunnel, but with more style...

BootExecute EDR Bypass : A Deep Dive Into Early Execution Techniques

0

Boot Execute allows native applications—executables with the NtProcessStartup entry point and dependencies solely on ntdll.dll—to run prior to the complete initialization of the Windows operating system. This occurs even before Windows services are launched. Historically, attackers have exploited this mechanism as a rudimentary persistence method. However, utilizing this feature requires administrative privileges, both to modify the corresponding registry key...

Hooka : Advanced Shellcode Loader Generation With Enhanced Evasion Techniques

0

Hooka is able to generate shellcode loaders with multiple capabilities. It is also based on other tools like BokuLoader, Freeze or Shhhloader, and it tries to implement more evasion features. Why in Golang? Why not? Features This tool is able to generate loaders with this features: Multiple shellcode injection techniques: SuspendedProcess ProcessHollowing NtCreateThreadEx EtwpCreateEtwThread NtQueueApcThreadEx No-RWX Get shellcode from raw file, PE, DLL or from a URL EXE and DLL...