ConnectWise, a company that makes software for IT management, made an announcement on Friday about updates that address a significant …
Ermir – An Evil Java RMI Registry
Ermir is an Evil/Rogue RMI Registry, it exploits unsecure deserialization on any Java code calling standard RMI methods on it …
Threatest – Threatest Is A Go Framework For End-To-End Testing Threat Detection Rules
Threatest is a Go framework for testing threat detection end-to-end. Threatest allows you to detonate an attack technique, and verify …
Sandman – NTP Based Backdoor For Red Team Engagements In Hardened Networks
Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a …
Whids – Open Source EDR For Windows
What EDR with artifact collection driven by detection. The detection engine is built on top of a previous project Gene …
ProtectMyTooling – Multi-Packer Wrapper Letting Us Daisy-Chain Various Packers, Obfuscators And Other Red Team Oriented Weaponry
Script that wraps around multitude of packers, protectors, obfuscators, shellcode loaders, encoders, generators to produce complex protected Red Team implants. …
After hackers threatened to target celebrities, Medibank confirmed the impact of a larger cyberattack
On Tuesday, Australian private insurer Medibank stated that a recent disclosed cyberattack affects more customers’ data than first believed. Days …
Usbsas – Tool And Framework For Securely Reading Untrusted USB Mass Storage Devices
usbsas is a free and open source (GPLv3) tool and framework for securely reading untrusted USB mass storage devices. Description …
PenguinTrace – Tool To Show How Code Runs At The Hardware Level
penguinTrace is intended to help build an understanding of how programs run at the hardware level. It provides a way …
WordPress Security Update 6.0.3 Patches 16 Vulnerabilities
This week, WordPress 6.0.3 began to be distributed. The most recent security update fixes 16 flaws. In addition to addressing …