YATAS : A Simple Tool To Audit Your AWS Infrastructure For Misconfiguration
The goal of YATAS is to help you create a secure AWS environment without too much hassle. It won't check for all best practices but only for the ones that are important for you based on my experience. Please feel free to tell me if you find something that is not covered. Features YATAS is a simple and easy to use...
AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion
AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye, Patriot, Moneta, PE-sieve, or MalMemDetect. Features Easy to Use Import a single CNA script before generating shellcode. Dynamic Memory Encryption Creates a new heap for any allocations from Beacon and encrypts entries before sleep. Code Obfuscation and Encryption Changes the memory containing CS executable code to non-executable and encrypts it (FOLIAGE). Return...
REST-Attacker : A Proof-Of-Concept For The Feasibility Of Testing
REST-Attacker is an automated penetration testing framework for APIs following the REST architecture style. The tool's focus is on streamlining the analysis of generic REST API implementations by completely automating the testing process - including test generation, access control handling, and report generation - with minimal configuration effort. Additionally, REST-Attacker is designed to be flexible and extensible with support...
Why Data Breach Protection Must Include Physical Security
Data breach protection is an essential element in business intelligence. It helps you to maintain client trust and comply with GDPR. Failing to provide data security will ultimately harm your business’s reputation and cause losses. Your data breach protection won’t be complete without physical security - want to know why? Keep reading as we explore the intertwined nature of physical and...
Types Of Security Breaches: Physical And Digital
Cloud-based security technologies are becoming increasingly popular in the security sphere, increasing the convenience of the user experience. However, with the introduction of these new technologies comes another consideration. Can we still treat physical and digital security as separate concepts? Keep reading as we discuss some of the ways that physical security and cybersecurity are linked in the modern security sphere. Top...
DotDumper : An Automatic Unpacker & Logger For DotNet Framework
DotDumper is a automatic unpacker and logger for DotNet Framework targeting files! This tool has been unveiled at Black Hat USA 2022. The automatic detection and classification of any given file in a reliable manner is often considered the holy grail of malware analysis. The trials and tribulations to get there are plenty, which is why the creation of such...
Security Cameras: Bridging The Gap Between Physical And Digital Cybersecurity
Physical and digital security are crucial to one another. Your digital resources are only as secure as your physical premises, and you need cybersecurity to protect your cloud-based physical security data. But how does surveillance fit into your cybersecurity strategy? Keep reading as we discuss why surveillance is essential to digital security and the latest advancements in the cloud-based surveillance sphere...
ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version
ExchangeFinder is a simple and open-source tool that tries to find Micrsoft Exchange instance for a given domain based on the top common DNS names for Microsoft Exchange. ExchangeFinder can identify the exact version of Microsoft Exchange starting from Microsoft Exchange 4.0 to Microsoft Exchange Server 2019. How does it work? ExchangeFinder will first try to resolve any subdomain that is commonly...
Villain : Windows And Linux Backdoor Generator And Multi-Session Handler
Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team. The main idea behind the payloads generated by this tool is inherited from HoaxShell. One could say that Villain is an evolved, steroid-induced version of it. Video...
PXEThief : Extract Passwords From The Operating System Deployment Functionality
PXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out of Configuration Manager (https://forum.defcon.org/node/241925) against the Operating System Deployment functionality in Microsoft Endpoint Configuration Manager (or ConfigMgr, still commonly known as SCCM). It allows for credential gathering from configured Network Access Accounts (https://docs.microsoft.com/en-us/mem/configmgr/core/plan-design/hierarchy/accounts#network-access-account) and any Task Sequence Accounts or...