All posts by Magdalena Jarzębska

02

May'22

Lupo - Malware IOC Extractor and Debugging module for Malware Analysis Automation

Introduction Working on security incidents that involve malware, we come across situations on a regular basis where we feel the …

Read More

02

May'22

28

Apr'22

ADReaper - A fast enumeration tool for Windows Active Directory Pentesting written in Go

ADReaper is a tool written in Golang which enumerates an Active Directory environment with LDAP queries within few seconds Installation You can download …

Read More

27

Apr'22

Shhhloader - SysWhispers Shellcode Loader

Shhhloader Shhhloader is a SysWhispers Shellcode Loader that is currently a Work in Progress. It takes raw shellcode as input …

Read More

27

Apr'22

Live Forensicator - Powershell Script to aid Incidence Response and Live Forensics

___________ .__ __ \_ _____/__________ ____ ____ _____|__| ____ _____ _/ |_ ___________ | __)/ _ \_ __ \_/ __ …

Read More

26

Apr'22

Spring4Shell-scan - a fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities

Features Support for lists of URLs. Fuzzing for more than 10 new Spring4Shell payloads (previously seen tools uses only 1-2 …

Read More

25

Apr'22

Lnkbomb - Malicious shortcut generator for collecting NTLM hashes from insecure file shares

Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The vulnerability exists due to Windows looking for …

Read More

22

Apr'22

Windows 10 exploitation with just one image by Anastasis Vasileiadis

Metasploit is the latest in the field of information security and penetration control. It has almost redefined how we can …

Read More

22

Apr'22

Account Takeover Fraud: What You Need to Know

In the 21st century, fraud is a business transferred from offline to online. In recent years, internet users have increased …

Read More

21

Apr'22

Ostorlab - a composable security scanning platform for all assets

Security testing requires often chaining tools together, taking the output from one, mangling it, filtering it and then pushing it …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013
GET A FREE EDITION!
Join our newsletter and receive for FREE, our premium edition “Brute Force and Supply Chain Attacks”
x