Elasticsearch infections are rising exponentially. The adversaries are exploiting open and exposed Elasticsearch interfaces to trigger infections in the cloud and non-cloud deployments. During this talk, we will release a tool named “STRAFER” to detect potential infections in the Elasticsearch instances. The tool allows security researchers, penetration testers, and threat intelligence experts to detect compromised and infected Elasticsearch instances running malicious code. The tool also enables you to conduct efficient research in the field of malware targeting cloud databases. In this version of the tool, the following modules are supported:
Note: This is the first release of the tool and we expect to add more modules in the nearby future.
Researched and Developed By: Aditya K Sood and Rohit Bansal
BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…
ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…
Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…
Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…
FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…
Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…