Forwarded from cKure Red
Raspberry Pi RP2040 Superior Boy Takes Cybersecurity on the Go.
https://www.hackster.io/superior-tech/advanced-cyber-security-and-education-device-superior-boy-133905
https://www.tomshardware.com/news/raspberry-pi-rp2040-superior-boy-takes-cybersecurity-on-the-go
https://www.hackster.io/superior-tech/advanced-cyber-security-and-education-device-superior-boy-133905
https://www.tomshardware.com/news/raspberry-pi-rp2040-superior-boy-takes-cybersecurity-on-the-go
Hackster.io
Advanced Cyber Security and Education Device - SUPERIOR BOY
Superior Boy is Cybersecurity, education, and research in one advanced device. Everything a mobile cybersecurity pro needs.
■■□□□ (Tool) HARpwn: A #PowerShell module designed to streamline the extraction and sanitization of HARTokens from HTTP Archive (HAR) files.
https://github.com/HCRitter/HARpwn
https://github.com/HCRitter/HARpwn
GitHub
GitHub - HCRitter/HARpwn: HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline…
HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitization of HARTokens from HTTP Archive (HAR) files. Simplify the ...
Forwarded from cKure Red
Wasm to Bypass Latest Chrome v8sbx
https://medium.com/@numencyberlabs/use-wasm-to-bypass-latest-chrome-v8sbx-again-639c4c05b157
https://medium.com/@numencyberlabs/use-wasm-to-bypass-latest-chrome-v8sbx-again-639c4c05b157
Medium
Use Wasm to Bypass Latest Chrome v8sbx Again
01 - Introduction
■■■■□ CVE-2023-34050 Spring AMQP Deserialization Remote Code Execution.
https://blog.pyn3rd.com/2023/11/03/CVE-2023-34050-Spring-AMQP-Deserialization-Remote-Code-Execution/
https://blog.pyn3rd.com/2023/11/03/CVE-2023-34050-Spring-AMQP-Deserialization-Remote-Code-Execution/
Pyn3Rd
CVE-2023-34050 Spring AMQP Deserialization Remote Code Execution
PrefaceAfter analyzing Spring Kafka deserialization vulnerability, I received another piece of threat intellegence information. According to VMware official security bulletin, it implies that this v
■■■□□ Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop.
https://www.securityweek.com/okta-hack-blamed-on-employee-using-personal-google-account-on-company-laptop/
https://www.securityweek.com/okta-hack-blamed-on-employee-using-personal-google-account-on-company-laptop/
SecurityWeek
Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop
Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.
■■■■□ StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million Devices.
https://thehackernews.com/2023/11/stripedfly-malware-operated-unnoticed.html
https://thehackernews.com/2023/11/stripedfly-malware-operated-unnoticed.html
■■□□□ Tool: Certificate Ripper 🔐
A CLI tool to extract server certificates.
https://github.com/Hakky54/certificate-ripper
A CLI tool to extract server certificates.
https://github.com/Hakky54/certificate-ripper
GitHub
GitHub - Hakky54/certificate-ripper: 🔐 A CLI tool to extract server certificates
🔐 A CLI tool to extract server certificates. Contribute to Hakky54/certificate-ripper development by creating an account on GitHub.
Report171-FindingYou-Oct-26.pdf
6.9 MB
■■■■□ Citizen-Lab report.
Finding You
The Network Effect of
Telecommunications Vulnerabilities
for Location Disclosure
Finding You
The Network Effect of
Telecommunications Vulnerabilities
for Location Disclosure
By Gary Miller and Christopher Parsons.■■□□□ Israel-Palestine Cyber-War update: Disinformation campaign by Israeli netizens.
Telegram group created to delete any fact started against Israel by reputed individuals and those who share is being reported to social media accounts as hate and thereby deleted.
●This complacency by social media organisations is apparently due to Israeli who are at higher levels in the organisation.
Screenshot shared as success rate of deletion by the admins if this group through the employees at higher positions.
Twitter and YouTube seem to be immune to these disinformation tactics.
"5.11 report, weekend at the policy teams.
We have compiled the user rating in the group, we will soon issue beautiful update reports including individual performance reports.
Thanks everyone for a great job! 🇮🇱"
Telegram group created to delete any fact started against Israel by reputed individuals and those who share is being reported to social media accounts as hate and thereby deleted.
●This complacency by social media organisations is apparently due to Israeli who are at higher levels in the organisation.
Screenshot shared as success rate of deletion by the admins if this group through the employees at higher positions.
Twitter and YouTube seem to be immune to these disinformation tactics.
We have compiled the user rating in the group, we will soon issue beautiful update reports including individual performance reports.
Thanks everyone for a great job! 🇮🇱"
cKure
■■□□□ Israel-Palestine Cyber-War update: Disinformation campaign by Israeli netizens. Telegram group created to delete any fact started against Israel by reputed individuals and those who share is being reported to social media accounts as hate and thereby…
■■□□□ As previously shared here: https://t.me/cKure/13014
The disinformation campaign results are corroborated by Aljazeera: https://www.aljazeera.com/features/2023/10/24/shadowbanning-are-social-media-giants-censoring-pro-palestine-voices
The social media agencies are not only infiltrated by the pro Israel lobby who delete posts just because they are critical of Israel (or critique them) and not necessary against the community guidelines but by the state entities forcing them as well. The repercussions and statements from the social media giants are posted here: https://www.isoc.org.il/regulating-digital-services/israel/platform-policies-iron-swords
The disinformation campaign results are corroborated by Aljazeera: https://www.aljazeera.com/features/2023/10/24/shadowbanning-are-social-media-giants-censoring-pro-palestine-voices
The social media agencies are not only infiltrated by the pro Israel lobby who delete posts just because they are critical of Israel (or critique them) and not necessary against the community guidelines but by the state entities forcing them as well. The repercussions and statements from the social media giants are posted here: https://www.isoc.org.il/regulating-digital-services/israel/platform-policies-iron-swords
■■■■■ iObfuscate: Unraveling iOS Obfuscation Techniques
During this talk, I examine multiple examples of #Reverse Engineering #iOS obfuscation techniques. Obfuscation strives to hide the underlying functionality of applications. This is particularly important in iOS applications that include a plethora of additional symbol data susceptible to reversing. I also release my new repository iOS Reverse Engineering repository.
https://github.com/LaurieWired/ObjectiveByTheSea2023
During this talk, I examine multiple examples of #Reverse Engineering #iOS obfuscation techniques. Obfuscation strives to hide the underlying functionality of applications. This is particularly important in iOS applications that include a plethora of additional symbol data susceptible to reversing. I also release my new repository iOS Reverse Engineering repository.
https://github.com/LaurieWired/ObjectiveByTheSea2023
GitHub
GitHub - LaurieWired/ObjectiveByTheSea2023: This contains notes and slides for my Objective by the Sea talk
This contains notes and slides for my Objective by the Sea talk - LaurieWired/ObjectiveByTheSea2023
■■■■□ webcopilot: enumerate subdomains of the target and detect vulnerabilities.
https://github.com/h4r5h1t/webcopilot
https://securityonline.info/webcopilot-enumerate-subdomains-of-the-target-and-detect-vulnerabilities/#google_vignette
https://github.com/h4r5h1t/webcopilot
https://securityonline.info/webcopilot-enumerate-subdomains-of-the-target-and-detect-vulnerabilities/#google_vignette
GitHub
GitHub - h4r5h1t/webcopilot: An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf…
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities. - h4r5h1t/webcopilot
■■■■■ DFIR Toolkit v0.9 releases: CLI tools for forensic investigation of Windows artifacts.
https://securityonline.info/dfir-toolkit-cli-tools-for-forensic-investigation-of-windows-artifacts/
https://securityonline.info/dfir-toolkit-cli-tools-for-forensic-investigation-of-windows-artifacts/
■■■■■ Octopii: A Personally Identifiable Information (PII) scanner that uses Optical Character Recognition (OCR), regular expression lists and Natural Language Processing (NLP) to search public-facing locations for Government ID, addresses, emails etc in images, PDFs and documents.
https://github.com/redhuntlabs/Octopii
https://github.com/redhuntlabs/Octopii
GitHub
GitHub - redhuntlabs/Octopii: An AI-powered Personal Identifiable Information (PII) scanner.
An AI-powered Personal Identifiable Information (PII) scanner. - redhuntlabs/Octopii
■■□□□ PrivFu: Kernel mode WinDbg extension and PoCs for token privilege investigation.
https://github.com/daem0nc0re/PrivFu
https://github.com/daem0nc0re/PrivFu
GitHub
GitHub - daem0nc0re/PrivFu: Kernel mode WinDbg extension and PoCs for token privilege investigation.
Kernel mode WinDbg extension and PoCs for token privilege investigation. - daem0nc0re/PrivFu
■■■□□ CVE-2022-0847 eBPF: An eBPF program to detect and defense attacks on CVE-2022-0847 (DirtyPipe).
https://github.com/h4ckm310n/CVE-2022-0847-eBPF
https://github.com/h4ckm310n/CVE-2022-0847-eBPF
GitHub
GitHub - h4ckm310n/CVE-2022-0847-eBPF: An eBPF program to detect attacks on CVE-2022-0847
An eBPF program to detect attacks on CVE-2022-0847 - h4ckm310n/CVE-2022-0847-eBPF
■■□□□ LdrLibraryEx: A small x64 library to load dll's into memory.
https://github.com/Cracked5pider/LdrLibraryEx
https://github.com/Cracked5pider/LdrLibraryEx
GitHub
GitHub - Cracked5pider/LdrLibraryEx: A small x64 library to load dll's into memory.
A small x64 library to load dll's into memory. Contribute to Cracked5pider/LdrLibraryEx development by creating an account on GitHub.