LLVM-YX-Callobfuscator : Enhancing Windows x64 Native Call Security At Compile Time
A powerful LLVM plugin designed to bolster the security of Windows x64 native calls during the compilation process. This innovative tool transparently applies stack spoofing and indirect syscalls, providing enhanced protection against potential threats. LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time. "I've 5 Mins, What Is This?" This project is a...
v6.5.0 : dnSpy Version 6.5.0 – New Features, Improvements, And Bug Fixes
In this update, dnSpy introduces a host of new features, enhancements, and bug fixes, making it a more powerful and efficient .NET debugger and decompiler. From support for .NET 8 and C# ref types to improved debugger capabilities and performance optimizations, let's dive into the exciting changes brought by dnSpy v6.5.0. New Features dnSpy now runs on .NET 8 and .NET...
MobSF Remote Code Execution (CVE-2024-21633) – Uncovering Vulnerabilities In Mobile Security Framework
I have found an arbitrary file write in apktool and reported via github security advisory. I was aware that many projects were relied upon or dependent to apktool but after the publish of advisory and fix not many seem to be noticed or cared about it. I decided to check its impact and exploitability in some of the big dependants, I have then started...
Watchman – Your Malware Alert Bot with Notion, Slack, And BetterUptime Integration
The vigilant configuration change alerting and incident escalation bot designed to safeguard your digital world. In this article, we'll explore how Watchman seamlessly integrates with popular tools like Notion, Slack, and BetterUptime to provide real-time protection against malware threats. Discover how to set up Watchman and bolster your cybersecurity defenses with ease. watchman is a configuration change alerting and incident escalation...
pphack : The Advanced Client-Side Prototype Pollution Scanner
The cutting-edge Client-Side Prototype Pollution Scanner. In this article, we'll delve into the installation process, usage, and features of pphack, a powerful tool for web security professionals and red teamers. Discover how pphack can help you identify and mitigate prototype pollution vulnerabilities in web applications. The Most Advanced Client-Side Prototype Pollution Scanner Install Using Go go install github.com/edoardottt/pphack/cmd/pphack@latest pphack relies on chromedp, so you...
BugBlaze : Your All-In-One Cybersecurity Toolkit
In the world of cybersecurity, staying ahead of potential threats is essential. BugBlaze is a powerful toolkit that simplifies the process of subdomain enumeration, DNS resolution, port scanning, and vulnerability scanning. In this article, we'll explore how BugBlaze can enhance your security efforts and provide a comprehensive overview of its features and usage. Continuous Reconnaissance And Vulnerability Scanning For Bug...
Use The Model To Predict – A Comprehensive Guide To Predictive Modeling And Retraining Ith Python
In the realm of data science and machine learning, 'Use the Model to Predict' is not just a phrase, but a powerful concept that can unlock valuable insights. In this article, we will explore the intricacies of predictive modeling and retraining using Python. Whether you want to apply an existing model for predictions or delve into retraining with fresh...
Active Directory Exploitation Cheat Sheet – A Comprehensive Guide To Enumeration And Attack Methods
This cheat sheet contains common enumeration and attack methods for Windows Active Directory. This cheat sheet is inspired by the PayloadAllTheThings repo. Summary Active Directory Exploitation Cheat Sheet Summary Tools Domain Enumeration Using PowerView Using AD Module Using BloodHound Remote BloodHound On Site BloodHound Using Adalanche Remote adalanche Useful Enumeration Tools Local Privilege Escalation Useful Local Priv Esc Tools Lateral Movement Powershell Remoting Remote Code Execution with PS Credentials Import a PowerShell Module and Execute its Functions Remotely Executing Remote Stateful commands Mimikatz Remote...
Frameless BITB – A New Approach To Phishing Attacks
A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented by login pages like Microsoft. This POC code is built for using this new BITB with Evilginx, and a Microsoft Enterprise phishlet. Before diving deep into this, I recommend that you first check my talk at BSides 2023, where I...
Chista | Open Source Threat Intelligence Framework – Understanding, Predicting, And Defending Against Cyber Threats
In the ever-evolving landscape of cybersecurity threats, staying one step ahead of malicious actors is crucial. Introducing Chista, an open-source Cyber Threat Intelligence (CTI) Framework designed to equip users with the tools and insights needed to understand, predict, and defend against cyber threats. In this article, we'll delve into how Chista harnesses data from various sources to provide invaluable...