Incident Response Playbooks – Streamlined Security Mitigation Guides

0

Welcome to the Incident Response Playbooks repository! We're creating these playbooks with the knowledge gained from LetsDefend to assist security experts in responding to various security incidents effectively. Whether you're new to incident response or a seasoned professional, you'll find valuable resources here to help you navigate and mitigate security threats. Table Of Contents Introduction Playbooks Getting Started Contributing Introduction Incident response is a critical aspect of maintaining...

HyperDbg v0.6-beta: Advanced Debugging & Memory Upgrades

0

If you’re enjoying HyperDbg, don’t forget to give a star on GitHub! Please visit Build & Install to configure the environment for running HyperDbg. Check out the Quick Start and Frequently Asked Questions (FAQs) to learn more. You can use the examples of using the debugger and the script engine to get started with HyperDbg. HyperDbg's memory model has undergone a significant change, transitioning to a multiple-EPTP model. This change has effectively resolved...

Awesome Command And Control

0

A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd like to contribute to this list, simply open a PR with your additions. Maintained by @tcostam. If you have contributions but can't pull request, give me a shout at twitter. Table Of Contents Tools Open Source Commercial Online Resources Articles Videos Tools Open Source Apfell: cross-platform, post-exploit, red teaming framework built with python3, docker,...

GDBleed – Advanced Binary Instrumentation with GDB

0

GDBleed - Dynamic-Static binary instrumentation framework on top of GDB GDBleed is a gdb wrapper exposing a set of commands for x86-64, ARM and MIPS (x86 and ARM thumb-mode in progress) architectures to perform binary instrumentation. The objective was to exploit the hackish features of GDB python API, while ignoring the software performance attribute (for now). And in the end to...

RedPersist – Advanced Windows Persistence in C#

0

In the evolving landscape of system management, maintaining application persistence is paramount. 'RedPersist' stands out as a robust solution, offering a myriad of techniques to ensure uninterrupted system presence. Dive into this comprehensive guide to explore its capabilities, from leveraging Eventviewer to harnessing the power of PowerShell profiles. Compiling Project Below 3rd party libraries are used in this project. TaskSchedulerFodyLoad the Visual...

Eyes: Email-Centric OSINT Uncovered

0

Eyes is an OSINT tool that focuses on extracting information related to an email address. Whether you’re a cybersecurity professional, a private investigator, or just a curious individual, Eyes can provide insights into the digital footprint associated with a specific email. It scours various platforms and databases to fetch data, making your investigation process smoother and more comprehensive. Installation Guide: Getting...

Villain – Elevating C2 OperationsVillain

0

A groundbreaking C2 framework designed for modern cybersecurity challenges. With its advanced TCP & HoaxShell capabilities, Villain is set to redefine command and control operations, offering unparalleled versatility and precision in the realm of cyber operations. Purpose Villain is a high level C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands,...

Cloud Katana – Serverless Security for Multi-Cloud

0

The cutting-edge toolset designed for the modern cloud landscape. Born from a dire need to streamline security evaluations in multi-cloud and hybrid cloud setups, this event-driven application embodies the future of serverless computing. Built atop Azure Functions, it not only accelerates research in Azure environments but also promises expansion to other cloud platforms. Dive in to discover how Cloud...

MaldevAcademyLdr.1 – Advanced EXE Loader Unveiled

0

It is our latest innovation in cybersecurity tools. This EXE loader goes beyond conventional designs, offering advanced features for robust system interactions. With a focus on enhanced security and sophisticated integration capabilities, it's set to revolutionize the way users interface with executable files. Quick Links Maldev Academy Home Maldev Academy Syllabus Maldev Academy Pricing EXE Loader Maldev Academy's October update saw several...

Cartographer – Advanced Code Coverage Mapping in Ghidra

0

Introduction There’s no doubt that reverse engineering can be a very complex and confusing matter, even for those that love doing it. Jumping into a program and being greeted with tons of assembly and weirdly-named functions and variables is hardly what most would call a fun time. Not to mention that identifying specific functionality in a program can be an...