🛠 Arsenal Image Mounter v3.9.218 #cyber #tools #infosec #informatique
https://arsenalrecon.com/insights/quick-tour-of-new-features-in-arsenal-image-mounter-v3-9-218
🛠 DeathSleep
PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution. #python #tool #infosec #informatique
there is no need to spoof the stack… if there is no stack
🛠 pretender
Cross-platform tool to obtain a MitM position inside Windows networks in the spirit of Responder and mitm6. It implements local name resolution spoofing using the mDNS, LLMNR, and NetBIOS-NS protocols as well as a DHCPv6 DNS takeover attack. #tools #networks #infosec #informatique
🇩🇪 Security experts from paluno (paluno.uni-due.de
) have developed a new technique that, for the first time, enables fuzz testing of protected memory areas in modern processors. #cyber #threats #infosec #informatique
All tested fingerprint drivers as well as wallets for storing cryptocurrency were affected. Someone could exploit these vulnerabilities to read biometric data or steal the entire balance of the stored cryptocurrency.
https://www.uni-due.de/2022-07-15-security-vulnerabilities-in-fingerprint-sensors-and-crypto-wallets
Analyse de menaces : Étapes d'une attaque informatique par ransomware - Réponse autonome de Darktrace (darktrace.com
)
Visualiser l'étendue d'une cyberattaque avec SOAR PROPHECy d'Airbus CyberSecurity (airbus-cyber-security.com
)
La chaîne inCyber vous permet désormais d'explorer quantité de vidéos relatives au FIC 2022 (forum-fic.com
). Bonne découverte.
#france #ransomware #threats #cyber #city #databreach #infosec #informatique
🛠 pamspy
Credentials Dumper for Linux using eBPF by Sylvain Peyrefitte. #linux #tools #infosec #informatique
🛠 Game Of Active Directory
GOAD is a vulnerable Active Directory environement for pentesters. #tools #microsoft #vuln #infosec #informatique
🛠 MalSeclogon is a a little tool to « play » with the Seclogon service #tools #windows #vuln #infosec #informatique
🛠 DFSCoerce : PoC for MS-DFSNM coerce authentication using NetrDfsRemoveStdRoot() method #tools #windows #vuln #infosec #informatique
🛠 New version of TinyCheck with MISP implementation 👍 #tools #raspberry #network #malware #wireless #infosec #smartphone #informatique
https://github.com/KasperskyLab/TinyCheck/releases/tag/v0.7-test
🛠 DFIR4vSphere is powershell module for VMWare vSphere forensics. #vmware #windows #powershell #tools #infosec #informatique
🛠 binbloom is able to analyse a raw binary firmware. #firmware #devices #tools #infosec #informatique
🛠 DeepSleep is a variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC. #memory #tools #malware #infosec #informatique
🛠 Hayabusa is a sigma-based threat hunting and fast forensics timeline generator for EVTX files. #rust #tools #infosec #informatique
🏹 Ce document de 138 pages traite de la mise en place d'une stratégie de protection dans le cadre de la guerre de l'information.
#france #cyber #business #threats #infosec #guerre #espionage #informatique
https://www.ege.fr/sites/ege.fr/files/media_files/CyberGIETI.pdf
🛠 regipy is a library for parsing offline registry hives. #python #tools #infosec #informatique
🛠 Mihari is a tool for OSINT based threat hunting. #osint #tools #infosec #informatique
🛠 Get-UnJlaive is a tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly. #tools #windows #malware #powershell #infosec #informatique
sc(r)apy | full metal packets
> We Are the Borg
> You Will be Assimilated
> Resistance is Futile