Cloud Katana – Serverless Security for Multi-Cloud

The cutting-edge toolset designed for the modern cloud landscape. Born from a dire need to streamline security evaluations in multi-cloud and hybrid cloud setups, this event-driven application embodies the future of serverless computing. Built atop Azure Functions, it not only accelerates research in Azure environments but also promises expansion to other cloud platforms. Dive in …

MaldevAcademyLdr.1 – Advanced EXE Loader Unveiled

It is our latest innovation in cybersecurity tools. This EXE loader goes beyond conventional designs, offering advanced features for robust system interactions. With a focus on enhanced security and sophisticated integration capabilities, it’s set to revolutionize the way users interface with executable files. Quick Links EXE Loader Maldev Academy’s October update saw several interesting modules …

GitHub Copilot Chat – Simplifying Code with AI

In July, we introduced a public beta of GitHub Copilot Chat, a pivotal component of our vision for the future of AI-powered software development, for all GitHub Copilot for Business users. Today, we’re thrilled to take the next step forward in our GitHub Copilot X journey by releasing a public beta of GitHub Copilot Chat for all GitHub …

Dark Web Archives – Unveiling Hidden Marketplaces & Scams

All public/Privately leaked Dark Web Marketplace (DNM) Scripts, Source codes and information. This archive will be a place for researchers, law enforcemet and etc to study DNMs, Fraud Markets and Common Dark Web Scams without the need to venture to Tor/I2P to find them, do research and etc. We’ll do that for you. In this …

Mshikaki – Advanced Shellcode Injection Tool for Bypassing AMSI

“Mshikaki – kebab (skewered meat, especially beef)” yum yum. In the realm of cybersecurity, stealth and efficiency are paramount. Enter ‘Mshikaki’, an advanced shellcode injection tool that stands out for its ability to seamlessly bypass the Antimalware Scan Interface (AMSI). Designed for both security researchers and penetration testers, Mshikaki ensures that your code remains undetected …

Azure AD Attack & Defense Playbook

This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected. All of the included scenarios, insights and comments are based on experiences from the contributors during their attack simulations, hands-on or real-world scenarios. It should be considered a living document, which will be …

BucketLoot – An Automated S3 Bucket Inspector

Thousands of S3 buckets are left open on the internet, which makes them an easy target for bad people who want to get private information from the files in these buckets that can be tied to a person or an organization. There isn’t much study or software that can use these S3 buckets to find …

SSB – A Faster & Simpler Way to Bruteforce SSH Server.

Secure Shell Bruteforcer – A faster & simpler way to bruteforce SSH server. In the evolving world of cybersecurity, speed and efficiency are paramount. Enter Kitabisa SSB, a Go-powered tool designed to revolutionize the approach to SSH bruteforcing. Offering a streamlined installation process and user-friendly options, it’s a must-have for professionals seeking a faster and simpler way to …

Bashfuscator – The Art of Concealing Bash Scripts

Documentation What Is Bashfuscator? Bashfuscator is a modular and extendable Bash obfuscation framework written in Python 3. It provides numerous different ways of making Bash one-liners or scripts much more difficult to understand. It accomplishes this by generating convoluted, randomized Bash code that at runtime evaluates to the original input and executes it. Bashfuscator makes …

Hacker’s SAT – A Collection of Resources for Budding SAT Hackers

A collection of Resources for budding SAT hackers (Satellites, not the test). Note: This is an evolving resource, so please contribute with a pull request Jump To: Web sites | Articles and Op-Eds | Tools and Projects | Videos | Books and White Papers | 2020 Write-Ups | Programming Libraries | Miscellaneous | Contacts Background The democratization of space has opened up a new frontier for exploration and innovation. But with this opportunity, new cybersecurity …