TerraLdr : A Payload Loader Designed With Advanced Evasion Features
TerraLdr is a Payload Loader Designed With Advanced Evasion Features. Details no crt functions imported syscall unhooking using KnownDllUnhook api hashing using Rotr32 hashing algo payload encryption using rc4 - payload is saved in .rsrc process injection - targetting 'SettingSyncHost.exe' ppid spoofing & blockdlls policy using NtCreateUserProcess stealthy remote process injection - chunking using debugging & NtQueueApcThread for payload execution Usage use GenerateRsrc to update DataFile.terra that'll be the payload...
YATAS : A Simple Tool To Audit Your AWS Infrastructure For Misconfiguration
The goal of YATAS is to help you create a secure AWS environment without too much hassle. It won't check for all best practices but only for the ones that are important for you based on my experience. Please feel free to tell me if you find something that is not covered. Features YATAS is a simple and easy to use...
AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion
AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye, Patriot, Moneta, PE-sieve, or MalMemDetect. Features Easy to Use Import a single CNA script before generating shellcode. Dynamic Memory Encryption Creates a new heap for any allocations from Beacon and encrypts entries before sleep. Code Obfuscation and Encryption Changes the memory containing CS executable code to non-executable and encrypts it (FOLIAGE). Return...
REST-Attacker : A Proof-Of-Concept For The Feasibility Of Testing
REST-Attacker is an automated penetration testing framework for APIs following the REST architecture style. The tool's focus is on streamlining the analysis of generic REST API implementations by completely automating the testing process - including test generation, access control handling, and report generation - with minimal configuration effort. Additionally, REST-Attacker is designed to be flexible and extensible with support...
Why Data Breach Protection Must Include Physical Security
Data breach protection is an essential element in business intelligence. It helps you to maintain client trust and comply with GDPR. Failing to provide data security will ultimately harm your business’s reputation and cause losses. Your data breach protection won’t be complete without physical security - want to know why? Keep reading as we explore the intertwined nature of physical and...
Types Of Security Breaches: Physical And Digital
Cloud-based security technologies are becoming increasingly popular in the security sphere, increasing the convenience of the user experience. However, with the introduction of these new technologies comes another consideration. Can we still treat physical and digital security as separate concepts? Keep reading as we discuss some of the ways that physical security and cybersecurity are linked in the modern security sphere. Top...
DotDumper : An Automatic Unpacker & Logger For DotNet Framework
DotDumper is a automatic unpacker and logger for DotNet Framework targeting files! This tool has been unveiled at Black Hat USA 2022. The automatic detection and classification of any given file in a reliable manner is often considered the holy grail of malware analysis. The trials and tribulations to get there are plenty, which is why the creation of such...
New WordPress Vulnerability Hijacks Site Visitors
Researchers have found an exploit within almost a dozen WordPress plugins that aim to hijack the user experience and send the visitor a site of the attacker’s choosing. Reinforcing the importance of security hygiene and tools such as a cutting-edge web application firewall, WordPress site managers need to analyze their site risk and patch ASAP. The Rise of Wordpress Wordpress is...
Security Cameras: Bridging The Gap Between Physical And Digital Cybersecurity
Physical and digital security are crucial to one another. Your digital resources are only as secure as your physical premises, and you need cybersecurity to protect your cloud-based physical security data. But how does surveillance fit into your cybersecurity strategy? Keep reading as we discuss why surveillance is essential to digital security and the latest advancements in the cloud-based surveillance sphere...
ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version
ExchangeFinder is a simple and open-source tool that tries to find Micrsoft Exchange instance for a given domain based on the top common DNS names for Microsoft Exchange. ExchangeFinder can identify the exact version of Microsoft Exchange starting from Microsoft Exchange 4.0 to Microsoft Exchange Server 2019. How does it work? ExchangeFinder will first try to resolve any subdomain that is commonly...