SilentMoonwalk – PoC Implementation Of A Fully Dynamic Call Stack Spoofer
SilentMoonwalk is a PoC Implementation of a fully dynamic call stack spoofer. TL;DR SilentMoonwalk is a PoC implementation of a fully dynamic call stack spoofer, implementing a technique to remove the original caller from the call stack, using ROP to desynchronize unwinding from control flow. Authors This PoC is the result of a joint research done on the topic of stack spoofing....
Unlock Your Employees’ Potential: How UEM Can Help Achieve Employee Experience
In recent years, organizations are increasingly championing the movement of employee satisfaction. Customer satisfaction, of course, is one of the quintessential factors for any enterprise to be successful. However, in recent times, enterprises have realized that employee satisfaction is an enabler of customer satisfaction and business success. From Endpoint Management to Experience Management - UEM does it the best! UEM solutions...
Taking Advantage of Emerging Betting Technologies
Betting has long been a popular pastime for many people around the world. With the emergence of new technologies, betting has become even more accessible and convenient. In this article, we will explore some of the ways in which new technologies are being used to take advantage of emerging betting opportunities. One of the most popular online tennis betting sites...
Mimicry : Security Tool For Active Deception In Exploitation And Post-Exploitation
Mimicry is a security tool developed by Chaitin Technology for active deception in exploitation and post-exploitation. Active deception can live migrate the attacker to the honeypot without awareness. We can achieve a higher security level at a lower cost with Active deception. Demo Quick Start 1. Make sure docker, docker-compose is installed correctly on the machine docker info docker-compose version 2. Install honeypot service docker-compose build docker-compose up...
How to Use the Snort IDS/IPS Complete Practical Guide
Snort is a widely used open-source Network Intrusion Detection System (NIDS) that can analyze network traffic and detect potential security threats. It works by analyzing network traffic in real time and comparing it against a set of rules, which the user or administrator defines. It can detect various attacks, such as port scans, buffer overflows, and malware infections. When Snort...
Wifi_Db : Script To Parse Aircrack-ng Captures To A SQLite Database
Wifi_Db is a script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes(in 22000 hashcat format), MGT identities, interesting relations between APs, clients and it's Probes, WPS information and a global view of all the APs seen. Features Displays if a network is cloaked (hidden) even if you have the ESSID. Shows a detailed table of connected...
Seekr : A Multi-Purpose OSINT Toolkit With A Neat Web-Interface
Seekr is a multi-purpose toolkit for gathering and managing OSINT-data with a sleek web interface. Our desktop view enables you to have all of your favourite OSINT tools integrated in one. The backend is written in Go with BadgerDB as database and it offers a wide range of features for data collection, organization, and analysis. Whether you're a researcher,...
Grepmarx : A Source Code Static Analysis Platform For AppSec Enthusiasts
Grepmarx is a web application providing a single platform to quickly understand, analyze and identify vulnerabilities in possibly large and unknown code bases. Features SAST (Static Analysis Security Testing) capabilities: Multiple languages support: C/C++, C#, Go, HTML, Java, Kotlin, JavaScript, TypeScript, OCaml, PHP, Python, Ruby, Bash, Rust, Scala, Solidity, Terraform, Swift Multiple frameworks support: Spring, Laravel, Symfony, Django, Flask, Node.js, jQuery, Express, Angular... 1600+...
Power of Ecommerce Fraud Prevention Tools
In today's digital age, online businesses are becoming increasingly vulnerable to fraud. With the rise of e-commerce, cybercriminals have found new ways to exploit vulnerabilities in payment systems and steal sensitive information from unsuspecting customers. As an online business owner, it is your responsibility to protect your customers' data and prevent fraudulent activities on your platform. This is where e-commerce...
Shoggoth – Asmjit Based Polymorphic Encryptor
Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically. Shoggoth will generate an output file that stores the payload and its corresponding loader in an obfuscated form. Since the content of the output is position-independent, it can be executed directly as a shellcode. While the payload is executing,...