1. Introduction Xiaomi is a Chinese electronics company headquartered in Beijing. It was founded by Lei Jun, who is currently…
Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared…
MultiPotato is just another Potato to get SYSTEM via SeImpersonate privileges. But this one is different in terms of It…
TrojanSourceFinder is a Trojan Source vulnerability allows an attacker to make malicious code appear innocent. In general, the attacker tries…
Mariana Trench is a security focused static analysis platform targeting Android. This guide will walk you through setting up Mariana…
log4j-scan is a fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts. Features Support for lists of URLs.Fuzzing…
Log4J-Detector is a Scanner that detects vulnerable Log4J versions to help teams assess their exposure to CVE-2021-44228 (CRITICAL), CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832. Can search for…
Jektor utility focuses on shellcode injection techniques to demonstrate methods that malware may use to execute shellcode on a victim…
Haptyc is a python library which was built to add payload position support and Sniper/Clusterbomb/Batteringram/Pitchfork attack types into Turbo Intruder.…
FiddleZAP is a simplified version of EKFiddle for OWASP ZAP. With ZAP as your web proxy, you are able to flag malicious…