Awesome Web Security – The Ultimate Guide To Mastering Techniques, Tools, And Resources

Needless to say, most websites suffer from various types of bugs which may eventually lead to vulnerabilities. Why would this happen so often? There can be many factors involved including misconfiguration, shortage of engineers’ security skills, etc. To combat this, here is a curated list of Web Security materials and resources for learning cutting edge …

CVE-2024-2432 Palo Alto GlobalProtect EoP : Unveiling The Path To Privilege Escalation

On Windows system, it was found that GlobalProtect (App version 6.1.1-5 and 6.2.0-89) was vulnerable to arbitrary file delete with elevated privileges by symbolic link attack lead to local privilege escalation on local machine. It was observed that when a Windows unprivileged user attempt to connect VPN with GlobalProtect, the process “PanGpHip.exe” will do the …

Awesome-OpSec : Empowering Digital Safety Through Feminist Cybersecurity And Operational Security

A Feminist Guide to Digital Defense serves as a comprehensive resource for enhancing online safety and privacy through a feminist lens. This guide compiles essential reads, DIY tutorials, and expert advice aimed at bolstering operational security. From the basics of cybersecurity to advanced tactics for securing digital spaces, it empowers readers to navigate the web …

CVE-2024-25153 : A Detailed Guide To Remote Code Execution In Fortra File Catalyst Workflow

This is a proof of concept for CVE-2024-25153, a Remote Code Execution vulnerability in Fortra FileCatalyst Workflow 5.x, before 5.1.6 Build 114. Full technical details can be found. Usage Run the exploit using the following command: Only the –host argument is required, and others are optional. Use the –help argument for full usage instructions. Disclaimer This proof-of-concept is for …

Kimsuky PowerShell Backdoor – A Comprehensive Analysis Of Its Commands And Operations

In the shadowy realms of cyber espionage, the Kimsuky PowerShell Backdoor stands as a sophisticated tool designed for stealthy infiltrations and data exfiltration. This article delves into the intricate workings of its server-client communication, presenting a detailed enumeration and analysis of the backdoor’s commands. Through examining these operational intricacies, we shed light on the tactics …

SpoofCheck – Fortifying Email Defenses By Unmasking Domain Spoofability

A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing. Additionally it will alert if the domain has DMARC configuration that sends mail or HTTP requests on failed SPF/DKIM emails. Usage: Domains are spoofable if any of the following conditions are …

Awesome Incident Response – Essential Tools And Resources

Digital Forensics and Incident Response (DFIR) teams are groups of people in an organization responsible for managing the response to a security incident, including gathering evidence of the incident, remediating its effects, and implementing controls to prevent the incident from recurring in the future. Contents IR Tools Collection Adversary Emulation All-In-One Tools

Ansible Role : Bloodhound-CE (Ludus) – A Quick Deployment Guide

An Ansible Role that installs Bloodhound-CE on a debian based system. To force the role to re-run, stop the docker container and remove the ludus_bloodhound_ce_install_path folder Requirements Debian based OS Role Variables Available variables are listed below, along with default values (see defaults/main.yml): Dependencies geerlingguy.docker Example Ludus Range Config ludus:

DetectDee – The Ultimate Guide To Tracing Social Media Profiles

DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing usernames, email addresses, or phone numbers. Tailored for cybersecurity experts, it offers precision, evasion capabilities against web application firewalls, and easy integration. This guide delves into the functionalities, installation, and usage of DetectDee, ensuring a …

Awesome Honeypots : Guardians Of The Digital Frontier – A Comprehensive Guide To Cybersecurity Tools

A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and others, with a focus on free and open source projects. There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the guide. Discover more …