CVE-2024-21762 Check – Identifying Vulnerability In FortiGate SSL VPNs
It provides a detailed guide on how to check if a FortiGate SSL VPN is vulnerable to CVE-2024-21762, a critical security flaw. Utilizing a Python script, users can quickly determine whether their VPN is at risk. The process, outlined with clear usage instructions, is designed for IT professionals and system administrators to ensure their network's security against potential exploits. Safely...
IntelMQ – Boosting Cybersecurity With Automation And Intelligence
IntelMQ is a solution for IT security teams (CERTs & CSIRTs, SOCs abuse departments, etc.) for collecting and processing security feeds (such as log files) using a message queuing protocol. It's a community driven initiative called IHAP1 (Incident Handling Automation Project) which was conceptually designed by European CERTs/CSIRTs during several InfoSec events. Its main goal is to give to incident responders an...
VMwareCloak – Stealth Mode Enhancement For VM Security To Outsmart Malware
A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analysis. Guaranteed to bring down your pafish ratings by at least a few points. The script accomplishes this by doing the following: Renames several registry keys that malware typically uses for VM detection. Kills VMware processes. Deletes VMware driver files (this...
Medusa Version 2.4.6 – Elevating Tool Security And Efficiency With Latest Enhancements
A significant update that marks a new milestone in the tool's development. This release brings forth a suite of enhancements and fixes designed to boost both functionality and reliability. From non-interactive mode enhancements to critical security updates, Version 2.4.6 ensures a smoother, more secure experience for users. This release includes a wide range of improvements and fixes that enhance the...
Windows – Seamless Integration And Management
Explore the innovative approach to running Windows inside a Docker container, offering a streamlined and flexible solution for developers and IT professionals. This guide provides an in-depth look at setting up Windows environments using Docker, from automatic ISO downloads and KVM acceleration to web-based management. Whether you're looking to create a Windows 11 machine or need to run legacy...
BypassAV – Mastering The Art Of Evading Anti-Virus And EDR Systems
In the constantly evolving landscape of cybersecurity, the ability to discreetly navigate past anti-virus (AV) and Endpoint Detection and Response (EDR) systems has become a pivotal skill for security professionals. "BypassAV" delves into the intricate world of evading detection, offering a comprehensive map of essential techniques that prioritize manual strategies over detectable open-source tools. This article serves as a...
Open Source Society University – A Gateway To Mastery In Computer Science
Open Source Society University (OSSU) offers a revolutionary approach to computer science education, blending self-paced learning with the rigor of a traditional CS degree. Tailored for independent learners and supported by a vibrant global community, OSSU provides access to world-class courses from top universities, ensuring a comprehensive education in computing. Dive into the OSSU curriculum to unlock your potential...
v1.0.0 – Elevating Cybersecurity And System Management Capabilities
The latest v1.0.0 release marks a significant advancement in cybersecurity and system management tools, introducing a host of new features and improvements. With enhancements across the Find, SMB, HTTP, MSSQL, and Admin modules, this update focuses on optimizing site server management, group membership unrolling, and security checks. Key additions include a more robust handling of LDAP searches, improved data...
How to interpret the MITRE Engenuity ATT&CK® Evaluations: Enterprise
Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the annual MITRE Engenuity ATT&CK Evaluations: Enterprise. This evaluation is critical for testing vendors because it’s virtually impossible to evaluate cybersecurity vendors based on their own performance...
Abusing Family Refresh Tokens For Unauthorized Access And Persistence In Azure Active Directory
In the evolving landscape of cloud security, a novel vulnerability within Azure Active Directory (Azure AD) exposes a critical risk to organizational assets. This article delves into the misuse of "family refresh tokens" to gain unauthorized access and maintain persistence in Azure AD environments. By exploring the technical underpinnings and potential attack pathways, we illuminate the urgent need for...