Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 321
» Latest member: Jamestug
» Forum threads: 76
» Forum posts: 101

Full Statistics

Online Users
There are currently 9 online users.
» 0 Member(s) | 9 Guest(s)

Latest Threads
Jamestug
Креативні концепції для в...

Forum: Announcement
Last Post: Jamestug
3 hours ago
» Replies: 0
» Views: 2
Shanenug
Де взяти авторитетні сайт...

Forum: Announcement
Last Post: Shanenug
5 hours ago
» Replies: 0
» Views: 2
Shanenug
Де взяти перевірені веб-с...

Forum: Announcement
Last Post: Shanenug
5 hours ago
» Replies: 0
» Views: 2
Shanenug
Як знайти авторитетні сай...

Forum: Announcement
Last Post: Shanenug
9 hours ago
» Replies: 0
» Views: 7
HowardPat
Готовите на каждый день? ...

Forum: Announcement
Last Post: HowardPat
9 hours ago
» Replies: 0
» Views: 7
DavidIcele
Підбірка новинних сайтів ...

Forum: Announcement
Last Post: DavidIcele
04-27-2026, 10:44 AM
» Replies: 0
» Views: 11
ForrestJet
Окремий цифровий простір

Forum: Announcement
Last Post: ForrestJet
04-26-2026, 10:44 AM
» Replies: 0
» Views: 16
ForrestJet
Автономний онлайн-платфор...

Forum: Announcement
Last Post: ForrestJet
04-26-2026, 09:28 AM
» Replies: 0
» Views: 12
Albertsom
Впорядкував зрозумілий до...

Forum: Announcement
Last Post: Albertsom
04-24-2026, 09:38 AM
» Replies: 0
» Views: 16
Terreduh
Альтернатива пропаганді: ...

Forum: Announcement
Last Post: Terreduh
04-23-2026, 12:33 PM
» Replies: 0
» Views: 14

 
  CVE-Vulns
Posted by: Unix_Root - 07-06-2025, 09:06 PM - Forum: Hot Topics - No Replies

#exploit
1⃣ CVE-2025-48703: (https://fenrisk.com/rce-centos-webpanel)
RCE in CentOS Web Panel
2⃣ CVE-2025-31200: (https://blog.noahhw.dev/posts/cve-2025-31200)
Zero-click RCE vulnerability in Apple's iOS 18.x
3⃣ CVE-2025-32463: (https://github.com/pr0v3rbs/CVE-2025-32463_chwoot)
Escalation of Privilege to the root through sudo binary with chroot option
4⃣ CVE-2025-49113: (https://github.com/fearsoff-org/CVE-2025-49113)
Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization
5⃣ CVE-2025-32433: (https://github.com/ProDefense/CVE-2025-32433)
Unauth RCE in Erlang/OTP SSH

Print this item

  #Malware_analysis
Posted by: Unix_Root - 07-06-2025, 09:04 PM - Forum: Malware analysis - No Replies

1. DEVMAN Ransomware
https://any.run/cybersecurity-blog/devma...e-analysis
2. BrowserVenom (Fake DeepSeek) Malicious installer
https://securelist.com/browservenom-mimi...oxy/115728
3. KimJongRAT Stealer
https://unit42.paloaltonetworks.com/kimj...powershell
4. macOS NimDoor
https://www.sentinelone.com/labs/macos-n...ed-malware
5. Windows Shortcut (LNK) Malware Strategies
https://unit42.paloaltonetworks.com/lnk-malware

Print this item

  #WebApp_Security
Posted by: Unix_Root - 07-06-2025, 09:03 PM - Forum: Writes-up - No Replies

#WebApp_Security
Bug Bounty Cheat Sheet, Ver.1.0.
1. Account Takeover (ATO) (https://github.com/swisskyrepo/PayloadsA...20Takeover)
2. API Key and Token Leaks (https://github.com/swisskyrepo/PayloadsA...ey%20Leaks)
3. Bypass Upload Tricky (https://github.com/swisskyrepo/PayloadsA...re%20Files)
4. Clickjacking (https://github.com/swisskyrepo/PayloadsA...ickjacking)
5. Client Side Path Traversal (CSPT) (https://github.com/swisskyrepo/PayloadsA...0Traversal)
6. Command Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
7. Content Injection (https://github.com/EdOverflow/bugbounty-...jection.md)
8. CORS (https://github.com/swisskyrepo/PayloadsA...ion)/OAuth (https://github.com/swisskyrepo/PayloadsA...figuration) Misconfiguration
9. CRLF Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
10. CSV Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
11. Cross-Site WebSocket Hijacking (CSWSH) (https://github.com/swisskyrepo/PayloadsA...s)/Request Forgery (CSRF/XSRF) (https://github.com/swisskyrepo/PayloadsA...%20Forgery)
12. DNS Rebinding (https://github.com/swisskyrepo/PayloadsA...0Rebinding)
13. DOM Clobbering (https://github.com/swisskyrepo/PayloadsA...Clobbering)
14. Dependency Confusion (https://github.com/swisskyrepo/PayloadsA...0Confusion)
15. Directory Traversal (https://github.com/swisskyrepo/PayloadsA...0Traversal)
16. External Variable Modification (https://github.com/swisskyrepo/PayloadsA...dification)
17. File Inclusion/LFI (https://github.com/swisskyrepo/PayloadsA...0Inclusion)
18. GraphQL Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
19. HTTP Request Smuggling (https://github.com/swisskyrepo/PayloadsA.../Parameter Pollution (HPP) (https://github.com/swisskyrepo/PayloadsA...0Pollution)
20. Insecure Deserialization (https://github.com/swisskyrepo/PayloadsA...on)/Direct Object References (https://github.com/swisskyrepo/PayloadsA...Management Interface (https://github.com/swisskyrepo/PayloadsA...Randomness (https://github.com/swisskyrepo/PayloadsA...ss)/Source Code Management (https://github.com/swisskyrepo/PayloadsA...Management)
21. LDAP Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
22. LaTeX Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
23. Mass Assignment (https://github.com/swisskyrepo/PayloadsA...Assignment)
24. Memory Exhaustion (DoS) (https://github.com/swisskyrepo/PayloadsA...%20Service)
25. NoSQL Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
26. ORM Leak (https://github.com/swisskyrepo/PayloadsA...ORM%20Leak)
27. Open URL Redirect (https://github.com/swisskyrepo/PayloadsA...20Redirect)
28. Prompt Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
29. Prototype Pollution (https://github.com/swisskyrepo/PayloadsA...0Pollution)
30. Race Condition (https://github.com/swisskyrepo/PayloadsA...0Condition)
31. Regular Expression DoS (ReDoS) (https://github.com/swisskyrepo/PayloadsA...Expression)
32. SAML Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
33. SQL Injection (SQLi) (https://github.com/swisskyrepo/PayloadsA...0Injection)
34. Server Side Include Injection (https://github.com/swisskyrepo/PayloadsA...n)/Request Forgery (https://github.com/swisskyrepo/PayloadsA...)/Template Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
35. SMTP Header Injection (https://www.acunetix.com/blog/articles/e...-injection)
36. Tabnabbing (https://github.com/swisskyrepo/PayloadsA...Tabnabbing)
37. Type Juggling (https://github.com/swisskyrepo/PayloadsA...20Juggling)
38. Web Cache Deception (https://github.com/swisskyrepo/PayloadsA...0Deception)
39. XPATH (https://github.com/swisskyrepo/PayloadsA...tion)/XSLT (https://github.com/swisskyrepo/PayloadsA...ction)/XSS (https://github.com/swisskyrepo/PayloadsA...ction)/XXE Injection (https://github.com/swisskyrepo/PayloadsA...0Injection)
40. Zip Slip Command Execution (https://github.com/snyk/zip-slip-vulnerability)

Print this item

  Salat Stealer - Malware Analysis
Posted by: Unix_Root - 06-19-2025, 04:30 PM - Forum: Writes-up - Replies (1)

Summary This report analyzes a UPX-packed Windows executable file identified as a Salat Stealer. The malware collects the victim's keystrokes, system information, browser-stored credentials, cryptocurrency wallet data, and messaging applications data. It can also access the victim's webcam and microphone. It compresses the collected data and then exfiltrates it to the command-and-control (C2) server over the Quick UDP Internet Connections (QUIC) protocol.
Link:
https://blog.pwndesal.xyz/salat-malware-...e-analysis

Print this item

  Sn1per
Posted by: zed - 06-19-2025, 06:21 AM - Forum: Popular tools - No Replies

[Image: 68747470733a2f2f736e31706572736563757269...322e706e67]
Attack Surface Management Platform
Discover hidden assets and vulnerabilities in your environment
[Find out more]
[Image: 68747470733a2f2f736e31706572736563757269...332e706e67]

The ultimate pentesting toolkit
Integrate with the leading commercial and open source vulnerability scanners to scan for the latest CVEs and vulnerabilities.

[Image: 68747470733a2f2f736e31706572736563757269...332e706e67]

Automate the most powerful tools
Security tools are expensive and time-consuming, but with Sn1per, you can save time by automating the execution of these open source and commercial tools to discover vulnerabilities across your entire attack surface.

[Image: 68747470733a2f2f736e31706572736563757269...312e706e67]

Find what you can't see
Hacking is a problem that's only getting worse. But, with Sn1per, you can find what you can’t see—hidden assets and vulnerabilities in your environment.

[Image: 68747470733a2f2f736e31706572736563757269...312e706e67]

Discover and prioritize risks in your organization
Sn1per is a next-generation information gathering tool that provides automated, deep, and continuous security for organizations of all sizes.


[Image: 68747470733a2f2f736e31706572736563757269...332e706e67]

Github :  https://github.com/1N3/Sn1per

Print this item

  How to develop a malware?
Posted by: zed - 06-19-2025, 06:11 AM - Forum: General discussion - Replies (3)

How to develop a malware?
That Question is always running on my mind when i was a beginner, but now every thing change until i saw this MalDev Academy, This is not promotion I just want to share it here maybe they know it.


This is the website : https://maldevacademy.com/   I hope It's helps.

Print this item

  Fuji: Forensic Unattended Juicy Imaging
Posted by: Unix_Root - 06-17-2025, 09:30 PM - Forum: Popular tools - Replies (1)

Fuji is a free, open source program for performing forensic acquisition of Mac computers. It should work on any modern Intel or Apple Silicon device, as it leverages standard executables provided by macOS.Fuji performs a so-called live acquisition (the computer must be turned on) of logical nature, i.e. it includes only existing files. The tool generates a DMG file that can be imported in several digital forensics programs.
Link:
https://github.com/Lazza/Fuji



Attached Files Thumbnail(s)
   
Print this item

  Automated Atomic Adversary Lab for Red Team Operations
Posted by: Unix_Root - 06-17-2025, 09:12 PM - Forum: Red Teaming - Replies (2)

Link:
https://bak3n3ko.medium.com/atomic-red-t...ef1ef2f59a

Print this item

  Builder for analysis-aware Windows droppers
Posted by: Unix_Root - 06-17-2025, 09:02 PM - Forum: Popular tools - No Replies

Quote:Cheska is intended for red teamers, researchers, and malware analysts operating within legal boundaries and in controlled, consented environments. Unauthorized deployment or use against systems you do not own or have explicit permission to test is illegal.

Requirements
Python 3
MinGW-w64 (sudo apt install mingw-w64)
How it works
Cheska is a builder for analysis-aware Windows droppers. All the user has to provide is the payload file and an optional output path where the resulting dropper will be saved.

When executed, the build script does the following in a nutshell:

validates that the provided payload is a valid Windows PE executable.
generates a random 3-character key used to XOR encode the payload and strings in the stub (e.g. DLL names).
generates a random 3-5-character string to be used as the resource name for the encoded payload.
configures the stub with the key and now encoded string values.
compiles the stub and embeds the encoded payload as a resource.
The dropper, upon execution, does the following:

Performs anti-analysis checks (detailed below)
Loads and decodes the payload from the resources section
Drops and executes the payload
Anti-Analysis Techniques
Category Technique Description
Anti-debugging Unhandled exception filter Detects attached debugger via custom exception logic.
Anti-sandbox Mouse presence check Detects whether a mouse device is installed.
Number of processors (<=2) Flags limited CPU environments.
RAM size (<2GB) Detects low-memory VMs or sandboxes.
Anti-VM Virtualization feature flag Uses PF_VIRTUALIZATION_ENABLED to detect VT-x/AMD-V.
Native VHD boot check Detects OS booted from VHD, common in VMs/sandboxes.
Additional Defense Evasion Techniques
To further minimize detection and complicate analysis, the stub also employs:

PEB walking for stealthy module enumeration
Dynamic API resolution to bypass static import detection
String obfuscation (e.g. XOR-encoded DLL and function names)
Setup
The builder was developed and tested on a Linux environment, leveraging MinGW-w64 for cross-compiling Windows binaries.

Clone this repository
git clone https://github.com/nemuelw/cheska.git
Navigate to the project directory
Create a virtual environment and activate it
python3 -m venv .venv
. .venv/bin/activate
Install project dependencies
pip3 install -r requirements.txt
Usage
python3 cheska.py -p <PAYLOAD_FILE> [-o <OUTPUT_FILE>]
Contribution
Contributions are welcome! Ideas for improvement include:

Better anti-VM techniques (e.g. VM driver or MAC address checks)
Additional anti-sandbox methods
Stub optimization or improved evasion heuristics
Link:
https://github.com/nemuelw/cheska

Print this item

  MacOS forensic acquisition made simple
Posted by: Unix_Root - 06-17-2025, 02:03 PM - Forum: Popular tools - No Replies

Link:
https://github.com/Lazza/Fuji



Attached Files Thumbnail(s)
   
Print this item