Thursday, May 16, 2024

Yearly Archives: 2022

Zloader Campaign Abuses Microsoft’s Security Checks

A Zloader campaign was uncovered that used Microsoft's digital signature verification mechanism to distribute malware payloads. The Malsmoke hacker group's effort steals user passwords...

MsfMania: — Python AV #Evasion Tool

MsfMania is a Python command-line utility that generates C source code that can be used to evade security checks before a payload is executed. New...

V3n0M-Scanner: A popular pentesting scanner for SQLi/XSS/LFI/RFI and other Vulns written in Python3.6.

It helps in Vulnerability Scanning & Pentesting Tool with an Offensive Approach Features:- MAKE USE OF PROXIES/VPN Cloud flare Resolver Scanning for LFI->RCE and...

New Ways to Hide Malware Inside SSD Firmware Discovered

  Korean researchers have developed a set of assaults against some solid-state discs (SSDs) that could allow malware to be planted at a position beyond...

New York Attorney General Alerts Companies about Credential Stuffing Attacks

The New York Attorney General's Office has found a series of credential stuffing attacks that went unnoticed for several months. According to Attorney General...

AES_Shellcode_Encryptor

This repository offers an utility that can encrypt any file type and output the encrypted result as an encrypted shell code. For injection operations...

Mortar: — Evasion Technique To Defeat And Divert Security Product Detection And Prevention (AV/EDR/XDR)

Using the red teaming evasion strategy, security solutions can be defeated and diverted from detection and prevention. Mortar Loader encrypts and decrypts selected binary...

PowerZure: – To assess #Azure security, use the #PowerShell framework.

PowerZure is a PowerShell project that evaluates and exploits resources in Microsoft's Azure cloud infrastructure. The requirement for a framework that can both undertake...

SATANKLGR

It is a Python-based keylogger generator for Windows. The following are some of the features: Keystrokes Webcam Screenshots Perseverance Benefits: Compatible with all Windows versions, including...

The Use of Phishing Toolkits to Bypass 2FA is on the Rise

Thousands of phishing toolkits have been identified that can intercept 2FA security codes and bypass security, according to a team of researchers. Hackers can...

Most Read

Write For Us