Thursday, September 28, 2023
EHA
CSN

New Tools

Mshikaki – Advanced Shellcode Injection Tool for Bypassing AMSI

"Mshikaki - kebab (skewered meat, especially beef)" yum yum. In the realm of cybersecurity, stealth and efficiency are paramount. Enter 'Mshikaki', an advanced shellcode...

Nessusploitable – Targeting Exploitable Nessus Vulnerabilities

Do you need to filter Nessus scan results and zero in on exploitable vulnerabilities? When you're on a penetration test or vulnerability assessment and...

AttackGen – Tailored Cyber Incident Response Testing

AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool...

Azure AD Attack & Defense Playbook

This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected. All of...

TinyCheck – Spotting Malicious Networks With Ease

Description TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in...

ProtoBurp++: Elevating Protobuf Security Research

A game-changer in cybersecurity tooling, designed to take Protobuf fuzzing and encoding in Burp Suite to new heights. Dive in to explore its enhanced...

Donut-Decryptor : Unmasking Binary Secrets

Navigating the maze of binary obfuscation? Meet the "Donut-Decryptor", a tool tailored to decode the elusive Donut obfuscation. Dive in to unravel its capabilities...

BucketLoot – An Automated S3 Bucket Inspector

Thousands of S3 buckets are left open on the internet, which makes them an easy target for bad people who want to get private...

Kubetools – A Curated List of Kubernetes Tools

There are more than 450+ Kubernetes Certified Service Providers and tons of Kubernetes Certified distributions. Choosing a right distribution can be a daunting task.  Kubetools is built with a...

Caro Kann – Evading Kernel Scans with Encrypted Shellcode

In the ever-evolving game of cybersecurity, encrypted shellcode injection emerges as a formidable method to sidestep defenses. This article unveils the "Caro Kann Defense"—a...