ChopChop – Web Security Testing Tool

0

ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT. Its goal is to scan several endpoints and identify exposition of services/files/folders through the webroot. Checks/Signatures are declared in a config file (by default: chopchop.yml), fully configurable, and especially by developers. "Chop chop" is a phrase rooted in Cantonese. "Chop chop" means "hurry" and...

CVE-2023-43770 POC – Unveiling XSS Vulnerability In Roundcube

0

In the dynamic realm of cybersecurity, vulnerabilities emerge and evolve constantly. The recent discovery of CVE-2023-43770 highlights an alarming Cross-Site Scripting (XSS) flaw in popular webmail software, Roundcube. This article delves deep into the vulnerability, offering a hands-on Proof-of-Concept to understand its intricacies and implications. Join us as we unveil the layers behind this significant security loophole. A Proof-Of-Concept for...

Building And Configuring – Kernel Exploits On Ubuntu 23.04

0

In the rapidly evolving landscape of Linux systems, vulnerabilities can emerge that challenge even seasoned developers. 'Building and Configuring: Kernel Exploits on Ubuntu 23.04' delves deep into the intricacies of kernel vulnerabilities found in Ubuntu's latest release. Through this guide, we'll navigate the steps for identifying, building, and exploiting these weaknesses, ensuring you're equipped with the latest knowledge on...

Nightmangle – Cyber Espionage via Telegram’s C2 Agent ExploredNightmangle

0

Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent, created by @1N73LL1G3NC3. It was developed as Proof of Concept (POC), that Telegram API can be used by threat actors for post-exploitation and to control their agents.. Nightmangle uses Telegram as a C2 server to communicate between the attacker and the client. However, it can only set one Telegram bot API per payload....

Script Overview – Decoding GootLoader Payloads And Obfuscations

0

In the intricate realm of cyber threats, GootLoader emerges as a formidable challenge. This article delves deep into the intricacies of decoding its payloads and obfuscations. Equipped with hands-on scripts and tools, we aim to guide cybersecurity enthusiasts and professionals through the maze of GootLoader. Get ready for an informative journey. GootLoaderAutoJsDecode.py - automatically decodes .js files using static analysis (recommended) GootLoaderAutoJsDecode-Dynamic.py - automatically decodes .js files...

Wireshark 4.0.10 Released – What’s New!

0

The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol development, network monitoring, communications protocol development, and education. Wireshark has announced version 4.0.10, which includes bug fixes, new improvements, and capabilities for improved packet inspection, making it a top choice for consumers and organizations in a variety of industries. <blockquote class="twitter-tweet"><p...

ELFEN – Linux Malware Analysis Sandbox

0

ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform both static and dynamic analysis. Results are available through both the GUI and API. Currently, ELFEN supports the analysis of ELF binaries for the following architectures: x86-64 MIPS 32-bit big/little-endian PowerPC 32-bit big-endian ARMv5 32-bit little-endian Getting Started Prerequisite Install docker and docker compose. Setup Clone the ELFEN...

Incident Response Playbooks – Streamlined Security Mitigation Guides

0

Welcome to the Incident Response Playbooks repository! We're creating these playbooks with the knowledge gained from LetsDefend to assist security experts in responding to various security incidents effectively. Whether you're new to incident response or a seasoned professional, you'll find valuable resources here to help you navigate and mitigate security threats. Table Of Contents Introduction Playbooks Getting Started Contributing Introduction Incident response is a critical aspect of maintaining...

HyperDbg v0.6-beta: Advanced Debugging & Memory Upgrades

0

If you’re enjoying HyperDbg, don’t forget to give a star on GitHub! Please visit Build & Install to configure the environment for running HyperDbg. Check out the Quick Start and Frequently Asked Questions (FAQs) to learn more. You can use the examples of using the debugger and the script engine to get started with HyperDbg. HyperDbg's memory model has undergone a significant change, transitioning to a multiple-EPTP model. This change has effectively resolved...

Awesome Command And Control

0

A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd like to contribute to this list, simply open a PR with your additions. Maintained by @tcostam. If you have contributions but can't pull request, give me a shout at twitter. Table Of Contents Tools Open Source Commercial Online Resources Articles Videos Tools Open Source Apfell: cross-platform, post-exploit, red teaming framework built with python3, docker,...