AI-powered voice cloning tools has provided cybercriminals with a tool to execute virtual kidnapping scams #chatbots #technologies #ai #future #kidnapping #threats #money #payments #scams #internet #digital #virtual #ransomware #simjacking #malvertising #services #sales #cloning #psychological #online #numérique #assaults #escroqueries #campaigns #fradulents #psychological #scare #tactics #tools #informatique
🛠 yara-ttd
Use YARA rules on Time Traveil Debugging traces. The idea behind
yara-ttd
is to use the trace files recorded by TTD withyara
itself to defeat packers #analysis #tools #sstic #debugging #malware #software #informatique
🛠 nbutools
Tools for offensive security of
NetBackup
infrastructures #python #sstic #tools #software #informatique
Avec du scapy
dedans
While collecting the evidence in 2023 we (Marco Lux & Pedro Umbelino) recognized the ESXi attack by a random #ransomware group. We decided it is time to publish our results which cumulated in CVE-2023-29552 #vuln #forensics ( via John Kristoff )
Interestingly, #internet search engines like @shodan, still missing SLP in their collection, which is a pity. #ddos #systems #devices #products #services #tools #routers #management #cyber #printers #daemons #hypervisors #networks #threats #informatique
A better way to attack Microsoft Azure AD with temporary access passes
Microsoft's TAPs were designed to simplify passwordless authentication, but they can also be used by attackers to bypass MFA.
Even if an administrator goes in and deletes the TAP, an attacker could still maintain access to the user account. In the process of the OAuth On-Behalf-Of (OBO) flow, we have somehow removed the correlation between the Temporary Access Passes (TAP) and the refresh token, a process I (
Daniel Heinsen
,SpecterOps
) am calling « OBO persistence ».Granted, in this scenario, you only have access to APIs that don't require admin consent, but that's enough to read the users email, Teams messages, OneNote notes, and calendar. In order to revoke this access, an administrator will need to revoke all the user refresh tokens. #microsoft #azure #python #script #tools #informatique
https://posts.specterops.io/id-tap-that-pass-8f79fff839ac
🛠 obo-wash
🛠 #binary #tools #sound #powershell #informatique
wav2bin.ps1
bin2wav.ps1
🛠 LeakSiteAnalytics
Data visualization of ransomware leak site data
#ransomware #tools #python #infosec #informatique
⎙ Lexmark
A small archive with exploit, writeup & #tools #printers #copiers #informatique
🛠 yaraQA
YARA rule Analyzer to improve rule quality and performance. Find and report issues to the author or maintainer of a YARA rule set #tools #informatique
🛠 IDA 8.2
This online tool will be freely accessible to all IDA users and features a list of safe, up-to-date plugins #ida #tools #infosec #plugin #extensions #informatique
🛠 gitea-extract-users
Python script to dump all users of a remote GiTea instance, unauthenticated or authenticated #python #gitea #dev #tools #informatique
☣️ VTI Cheat Sheet
Virus Total will continuously update the VTI Cheat Sheet to keep it as fresh and useful as possible. Happy hunting! #malware #infosec #tools #informatique
https://blog.virustotal.com/2022/12/vt-intelligence-cheat-sheet.html
🛠 VX-API v2.0.402 #tools #malware #informatique
🛠 CrackMapExec
v5.4.0 is now publicly available to everyone on Github or Kali Linux (
kali.org
) #linux #tools #pentest #informatique
https://wiki.porchetta.industries/news-2022/indestructible-g0thm0g
sc(r)apy | full metal packets
> We Are the Borg
> You Will be Assimilated
> Resistance is Futile