Kraken – Cross-platform Yara Scanner Written In Go

KitPloit - PenTest Tools!-- Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD and Linux. It is primarily intended for incident response, research and ad-hoc detections (not for endpoint protection). Following are the core features: Scan running executables and memory of running processes with provided Yara rules (leveraging go-yara). … Continue reading Kraken – Cross-platform Yara Scanner Written In Go

North Korean Hackers Used ‘Torisma’ Spyware in Job Offers-based Attacks

The Hacker News-- A cyberespionage campaign aimed at aerospace and defense sectors in order to install data gathering implants on victims' machines for purposes of surveillance and data exfiltration may have been more sophisticated than previously thought. The attacks, which targeted IP-addresses belonging to internet service providers (ISPs) in Australia, Israel, Russia, and defense contractors … Continue reading North Korean Hackers Used ‘Torisma’ Spyware in Job Offers-based Attacks

How to start Bug Bounty?

InfoSec Write-ups - Medium-- Simple Methodology to follow when starting a bug bountyPhoto by TechGig.comProject TrackingKeep track of site-hierarchy, tools output, interesting notes, etc.We can use mind-maps to visualize large scope by bug bounty hunting targets and allows them to break up methodology for in-depth bug hunting as well.Mission-wide recon is the art of discovering as many assets … Continue reading How to start Bug Bounty?

Bypass AMSI in PowerShell — A Nice Case Study

InfoSec Write-ups - Medium-- Bypass AMSI in PowerShell — A Nice Case StudyIn one of the RedTeam projects, I was looking to use BloodHoundAD Script. BloodHound is a single page JavaScript web application, built on top of Linkurious, compiled with Electron, with a Neo4j database fed by a C# data collector. BloodHound uses graph theory to reveal the … Continue reading Bypass AMSI in PowerShell — A Nice Case Study

Prop 24 passes in California, will change data privacy law

Malwarebytes Labs-- First-day returns in California showed voters firmly approving to change their state’s current data privacy law—which already guarantees certain privacy protections that many states do not—through the passage of Prop 24. As of the morning of November 4, according to The Sacramento Bee, 56.1 percent of California voters said “Yes” to Prop 24. … Continue reading Prop 24 passes in California, will change data privacy law

SwiftyInsta – Instagram Unofficial Private API Swift

KitPloit - PenTest Tools!-- Instagram offers two kinds of APIs to developers. The Instagram API Platform (extremely limited in functionality and close to being discontinued), and the Instagram Graph API for Business and Creator accounts only. However, Instagram apps rely on a third type of API, the so-called Private API or Unofficial API, and SwiftyInsta … Continue reading SwiftyInsta – Instagram Unofficial Private API Swift

Premium-Rate Phone Fraudsters Hack VoIP Servers of 1200 Companies

The Hacker News-- Cybersecurity researchers today took the wraps off an on-going cyber fraud operation led by hackers in Gaza, West Bank, and Egypt to compromise VoIP servers of more than 1,200 organizations across 60 countries over the past 12 months. According to findings published by Check Point Research, the threat actors — believed to … Continue reading Premium-Rate Phone Fraudsters Hack VoIP Servers of 1200 Companies