Cyber security

Living Off The LandLeaked Certificates (LoLCerts) – Unveiling The Underworld

Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates.

This threat is becoming more relevant as more and more defenses are relying on digital signatures for allowing or not execution on an endpoint.

This project aims at collecting the details of the certificates that are known to be abused in the wild by malicious actors.

The scripts directory contains a Python script used to generate Yara rules for all the certificates. Rules are written according to Nextron System – Short tutorial how to create a yara rule for a compromised certificate.

To generate all the yara rules:

cd scripts/
python3 generate_yara.py

Schema:

name: name_of_the_certificate
meta:
  status: revoked|valid
  source: leaked|malicious
  description: |
    Brief description of the certificate and where was it obtained from
  references: Threat intelligence reference
  date: Date of release
  author: Author Name
issuer: Issuer of the certificate
timestamp: Unix timestamp of when the cert was leaked, if relevant
serial: Array of strings containing the serial numbers of the certificates
thumbprint: Optional array of strings containing the thumbprints of the certificates
Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

PromptFoo – Streamlining LLM Application Development And Security Testing

An innovative tool designed to revolutionize the testing, evaluation, and security of LLM applications. This…

2 days ago

AdbNet – Mastering Android Device Exploitation

A sophisticated tool designed for exploiting vulnerabilities in Android devices. This article dives into the…

3 days ago

SeamlessPass – Bridging Kerberos Authentication With Microsoft 365 Access

SeamlessPass is a tool designed to obtain Microsoft 365 access tokens using on-premises Active Directory…

3 days ago

Awesome Forensics – The Forensic Analyst’s Toolkit An In-Depth Exploration

Comprehensive guide to the tools and resources pivotal in the world of forensic analysis. From…

3 days ago

CVEScannerV2 – Enhancing Network Security With Nmap Vulnerability Detection Script

An advanced Nmap script designed to detect potential vulnerabilities in network services. This article delves…

3 days ago

File Tunnel – Innovative TCP Connection Tunneling via Files

A powerful tool designed to tunnel TCP connections through a file. Ideal for circumventing firewalls…

3 days ago