Cloud Katana – Serverless Security for Multi-Cloud

0

The cutting-edge toolset designed for the modern cloud landscape. Born from a dire need to streamline security evaluations in multi-cloud and hybrid cloud setups, this event-driven application embodies the future of serverless computing. Built atop Azure Functions, it not only accelerates research in Azure environments but also promises expansion to other cloud platforms. Dive in to discover how Cloud...

MaldevAcademyLdr.1 – Advanced EXE Loader Unveiled

0

It is our latest innovation in cybersecurity tools. This EXE loader goes beyond conventional designs, offering advanced features for robust system interactions. With a focus on enhanced security and sophisticated integration capabilities, it's set to revolutionize the way users interface with executable files. Quick Links Maldev Academy Home Maldev Academy Syllabus Maldev Academy Pricing EXE Loader Maldev Academy's October update saw several...

Cartographer – Advanced Code Coverage Mapping in Ghidra

0

Introduction There’s no doubt that reverse engineering can be a very complex and confusing matter, even for those that love doing it. Jumping into a program and being greeted with tons of assembly and weirdly-named functions and variables is hardly what most would call a fun time. Not to mention that identifying specific functionality in a program can be an...

GitHub Copilot Chat – Simplifying Code with AI

0

In July, we introduced a public beta of GitHub Copilot Chat, a pivotal component of our vision for the future of AI-powered software development, for all GitHub Copilot for Business users. Today, we’re thrilled to take the next step forward in our GitHub Copilot X journey by releasing a public beta of GitHub Copilot Chat for all GitHub Copilot individual users across...

Dark Web Archives – Unveiling Hidden Marketplaces & Scams

0

All public/Privately leaked Dark Web Marketplace (DNM) Scripts, Source codes and information. This archive will be a place for researchers, law enforcemet and etc to study DNMs, Fraud Markets and Common Dark Web Scams without the need to venture to Tor/I2P to find them, do research and etc. We'll do that for you. In this archive you can find everything found...

Mshikaki – Advanced Shellcode Injection Tool for Bypassing AMSI

0

"Mshikaki - kebab (skewered meat, especially beef)" yum yum. In the realm of cybersecurity, stealth and efficiency are paramount. Enter 'Mshikaki', an advanced shellcode injection tool that stands out for its ability to seamlessly bypass the Antimalware Scan Interface (AMSI). Designed for both security researchers and penetration testers, Mshikaki ensures that your code remains undetected while achieving its objectives. Overview Mshikaki is...

Nessusploitable – Targeting Exploitable Nessus Vulnerabilities

0

Do you need to filter Nessus scan results and zero in on exploitable vulnerabilities? When you're on a penetration test or vulnerability assessment and you have to review Nessus scan results, you can filter using Nessus or you can export a Nessus .nessus file for distrubution or offline parsing. Nessusploitable parses .nessus files for exploitable vulnerabilities and outputs a...

AttackGen – Tailored Cyber Incident Response Testing

0

AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details. Table Of Contents Star the Repo Features Releases Requirements Installation Data Setup Running AttackGen Usage Contributing Licence Star The Repo If you find AttackGen useful, please consider starring the repository on GitHub. This...

Azure AD Attack & Defense Playbook

0

This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected. All of the included scenarios, insights and comments are based on experiences from the contributors during their attack simulations, hands-on or real-world scenarios. It should be considered a living document, which will be updated as practices progress &...

TinyCheck – Spotting Malicious Networks With Ease

0

Description TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). The idea of TinyCheck emerged...