Yearly Archives: 2022
Zloader Campaign Abuses Microsoft’s Security Checks
IEMLabs -
A Zloader campaign was uncovered that used Microsoft's digital signature verification mechanism to distribute malware payloads. The Malsmoke hacker group's effort steals user passwords...
MsfMania: — Python AV #Evasion Tool
IEMLabs -
MsfMania is a Python command-line utility that generates C source code that can be used to evade security checks before a payload is executed.
New...
V3n0M-Scanner: A popular pentesting scanner for SQLi/XSS/LFI/RFI and other Vulns written in Python3.6.
IEMLabs -
It helps in Vulnerability Scanning & Pentesting Tool with an Offensive Approach
Features:-
MAKE USE OF PROXIES/VPN
Cloud flare Resolver
Scanning for LFI->RCE and...
New Ways to Hide Malware Inside SSD Firmware Discovered
IEMLabs -
Korean researchers have developed a set of assaults against some solid-state discs (SSDs) that could allow malware to be planted at a position beyond...
New York Attorney General Alerts Companies about Credential Stuffing Attacks
IEMLabs -
The New York Attorney General's Office has found a series of credential stuffing attacks that went unnoticed for several months. According to Attorney General...
AES_Shellcode_Encryptor
IEMLabs -
This repository offers an utility that can encrypt any file type and output the encrypted result as an encrypted shell code. For injection operations...
Mortar: — Evasion Technique To Defeat And Divert Security Product Detection And Prevention (AV/EDR/XDR)
IEMLabs -
Using the red teaming evasion strategy, security solutions can be defeated and diverted from detection and prevention. Mortar Loader encrypts and decrypts selected binary...
PowerZure: – To assess #Azure security, use the #PowerShell framework.
IEMLabs -
PowerZure is a PowerShell project that evaluates and exploits resources in Microsoft's Azure cloud infrastructure. The requirement for a framework that can both undertake...
The Use of Phishing Toolkits to Bypass 2FA is on the Rise
IEMLabs -
Thousands of phishing toolkits have been identified that can intercept 2FA security codes and bypass security, according to a team of researchers. Hackers can...