B(l)utter: A Tool for Reverse Engineering Flutter Mobile Applications

0

Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime Currently the application supports only Android libapp.so (arm64 only). Also the application is currently work only against recent Dart versions. For high priority missing features, see TODO Environment Setup This application uses C++20 Formatting library. It requires very recent C++ compiler such as g++>=13, Clang>=15. I recommend using Linux OS (only tested on Deiban...

BestEDROfTheMarket: A User-Mode EDR Evasion Lab for Learning and Testing

0

Little AV/EDR Evasion Lab for training & learning purposes. (????️ under construction..)​ ____ _ _____ ____ ____ ___ __ _____ _ | __ ) ___ ___| |_ | ____| _ | _...

GitAlerts: Enhancing GitHub Security and Monitoring for Organization Repositories

0

GitHub has become an important tool for version control and project management in the ever-changing world of software development and teamwork. GitHub is used by organizations and developers all over the world to store their repositories, work together on code, and keep track of their software projects. But, as the saying goes, "Great power comes great responsibility." It's easy...

CVE-2023-6553 Exploit V2

0

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. An attacker can control the values passed to an include statement, leveraging that to achieve remote code execution. This vulnerability allows unauthenticated attackers to execute code on the server easily. Installation Ensure you have Python 3.x installed on your system. Install...

ICSpector: Microsoft’s Open-Source ICS Forensics Framework

0

Microsoft ICS Forensics Tools framework is an open-source forensics framework that enables the analysis of Industrial PLC metadata and project files.The framework provides investigators with a convenient way to scan for PLCs and identify any suspicious artifacts within ICS environments, which can be used for manual checking, automated monitoring tasks, or incident response operations to detect compromised devices.By being...

Atlassian Companion RCE Vulnerability Proof of Concept (CVE-2023-22524)

0

Atlassian Companion for macOS has a serious remote code execution vulnerability that was just found. It is called CVE-2023-22524. This flaw is a major security risk because it lets attackers get around both the app's blocklist and macOS Gatekeeper, which could allow harmful code to run. This piece will go into the technical details of this vulnerability, look at...

ADOKit: Azure DevOps Services Attack Toolkit

0

Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by taking advantage of the available REST API. The tool allows the user to specify an attack module, along with specifying valid credentials (API key or stolen authentication cookie) for the respective Azure DevOps Services instance. The attack modules supported...

CreateToken: Exploiting ZwCreateToken() for SYSTEM Token

0

In the realm of cybersecurity, understanding and exploiting Windows APIs is pivotal for both defenders and attackers. In this article, we delve into the intricacies of the ZwCreateToken() API and explore how it can be exploited to obtain a coveted SYSTEM token with full privileges. Through a step-by-step walkthrough, we will uncover the techniques and tools used in this...

LDAP Nom Nom: Insane-Speed Active Directory User Enumeration via LDAP Ping Exploitation

0

With the help of LDAP Ping requests (cLDAP), "LDAP Nom Nom" is a powerful tool that quickly and quietly brute-forces Active Directory usernames. This piece goes into great detail about LDAP Nom Nom, explaining what it can do and how it might affect cybersecurity. It works very quickly and can check usernames against multiple Domain Controllers at the same time...

Mastering YARA: A Comprehensive Guide to Detection Engineering and Rule Development

0

Threat identification and analysis are very important for keeping systems and networks safe in the ever-changing world of cybersecurity. YARA is an open-source tool that has become an essential tool for cybersecurity experts. It can be used to identify and classify malware samples. This article is a complete guide that goes over YARA and all of its different features...