Pathfinder : High-Resolution Control-Flow Attacks Exploiting The Conditional Branch Predictor

0

Researchers delve into the vulnerabilities inherent in Intel's branch prediction algorithms. Highlighting novel control-flow attacks, the study showcases techniques that leverage the Conditional Branch Predictor to manipulate and observe path history in modern CPUs. This pivotal research, conducted by experts from the University of California San Diego, opens new avenues for understanding and securing microarchitectural operations against potential exploits. System...

vArmor : Enhancing Container Security In Cloud-Native Environments

0

vArmor is a cloud-native container sandbox system. It leverages Linux's AppArmor LSM, BPF LSM and Seccomp technologies to implement enforcers. It can be used to strengthen container isolation, reduce the kernel attack surface, and increase the difficulty and cost of container escape or lateral movement attacks. You can leverage vArmor in the following scenarios to provide sandbox protection for containers within a Kubernetes cluster. In...

DOLOST – Harnessing Cyber Deception For Strategic Security Deployments

0

Explore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception. This tool automates the deployment of decoys and deceptive environments, enhancing security strategies. Learn how DOLOST not only creates but also meticulously designs these operations to outsmart and trap potential threats. Table Of Contents About Installation Usage Examples Contributing License About DOLOST is a framework designed to automate the creation and deployment of decoys and...

LDAP Firewall – Enhancing Security With Advanced Active Directory Protection

0

LDAP Firewall is an open-source tool for Windows servers that lets you audit and restrict incoming LDAP requests. Its primary use-cases are to protect Domain Controllers, block LDAP-based attacks and tightly control access to the Active Directory schema (e.g enforcing read-only access for users). The tool is written in C++ and makes use of the Microsoft Detours and JsonCpp packages. Some useful resources to get you started: Introduction...

CVE-2024-36401 : GeoServer Unauthenticated Remote Code Execution In Evaluating Property Name Expressions

0

GeoServer is an open-source software server written in Java that provides the ability to view, edit, and share geospatial data. It is designed to be a flexible, efficient solution for distributing geospatial data from a variety of sources such as Geographic Information System (GIS) databases, web-based data, and personal datasets. In the GeoServer version prior to 2.25.1, 2.24.3 and 2.23.5...

BetterScan-CE Wiki : Integrating Comprehensive Security Scans Into DevOps

0

It is a Code and Infrastructure (IaC) and Cloud-native Scanning/SAST/Static Analysis/Linting solution using many tools/Scanners with One Report. You can also add any tool to it. Currently, it supports many languages and tech stacks. If you like it, please give it a GitHub star/fork/watch/contribute. This will ensure continuous development. Run this command in your code directory (checkout from Git - .git...

Betterscan – Comprehensive Security Orchestration For Code And Infrastructure

0

Scan your source code and infra IaC against top security risks Betterscan is a orchestration toolchain that uses state of the art tools to scan your source code and infrastructure IaC and analyzes your security and compliance risks. Currently supports: PHP, Java, Scala, Python, PERL, Ruby, .NET Full Framework, C#, C, C++, Swift, Kotlin, Apex (Salesforce), Javascript, Typescript, GO, Infrastructure as a Code (IaC) Security and Best Practices (Docker, Kubernetes (k8s), Terraform AWS, GCP, Azure), Secret Scanning (166+ secret types), Dependency...

SQLRecon – Comprehensive Guide To SQL Server Exploitation And Defense

0

SQLRecon is a Microsoft SQL Server toolkit that is designed for offensive reconnaissance and post-exploitation. For detailed information on how to use each technique, refer to the wiki. You can download a copy of SQLRecon from the releases page. Alternatively, feel free to compile the solution yourself. This should be as straight forward as cloning the repo, double clicking the solution file and...

OnMouseMove-HtmlFile-PoC : Unpacking The HTML File Exploit In Russian APT Cyberattacks

0

PoC for onMouseMove HTML file used in the Russian APT Group campaign targeting Ukraine The HTML File is included as an attachment in the phishing email, when the victim opens the html file and moves the mouse, this triggers the event handler attribute "onmousemove" which runs the Javascript, which further decodes the base64 encoded blob present in the HTML Body....

AWS CDK – Cloud Development Kit

0

AWS CDK uses the familiarity and expressive power of programming languages for modeling your applications. It provides high-level components called constructs that preconfigure cloud resources with proven defaults, so you can build cloud applications with ease. Prerequisites​ You have python3 installed and setup locally in your system path, refer to the docs for installation You have installed and configured the AWS CDK locally Ensure you have all...