All of us know that in file format fuzzing, we fuzz different aspects of a file such as flags, file format constraints, structures etc. by generating multiple malformed samples, opening them and waiting for the program crash. We then process the generated debug information to find out if we found something interesting in the crash. Surprisingly, there is a dearth of file format fuzzers. However, we now have OpenXMolar for the Microsoft Windows operating system. Read more about OpenXMolar: A OpenXML File Format Fuzzing Framework!
Recently, we posted about HatCloud, a different tool which identifies CloudFlare protected IP addresses. This post is about CloudFail, a tool which detects CloudFlare protected hosts and then some more. Read more about CloudFail: Detect CloudFlare Secured Hosts!
Malware's are always getting smarter and trying to outsmart our generic detection methodologies. One of the first ways they avoid detection is by checking if the executing environment is a virtual machine (VM). There are multiple ways to do that. Red Pill by Joanna Rutkowska, verifying memory structures such as Store Interrupt Descriptor Table (SIDT), Store Local Descriptor Table (SLDT), Store Global Descriptor Table (SGDT) and Store Task Register (STR) and checking for well known registry Read more about Antivmdetection: Thwart Virtual Machine Detection!
Back after a hitaus - this short post is about Prowl an open source Python script that was released a few days ago. It helps you scrape LinkedIn data of a company, which can be used for OSINT purposes. It leverages the Yahoo! search engine for it's search. After it is done searching for the jobs, it then uses the Indeed job search engine to look for jobs in the company you are searching for.It also has a capability to search for the discovered user in the have i been pwned? database for Read more about [SHORT POST] Prowl: Scrape LinkedIn Data for OSINT!
Hiding your tracks for public facing targets has become easier - thanks to scanless! It allows you to scan IP addresses utilizing online services that already exist. However, instead of you manually submitting the target to each of them, this Python script does it for you.What is scanless?Scanless is an open source script coded in Python that helps you to perform port scans utilizing multiple online scanners such as you get signal, View DNS, Hacker Target, IPFingerPrints, ping.eu, Read more about scanless: Anonymize Your Port Scans!
If you use Kali and like searchsploit, chances are you will like getsploit even more. What searchsploit is to exploit-db, getsploit is to well, every exploit source covered by vulners.com. Read more about getsploit: Search & Download Exploits!
There are exploitation frameworks and then there is Metasploit. Though it has a few modules targeted towards embedded devices, it is your "general purpose" framework. If you are looking at a comprehensive embedded devices/router exploitation framework you now have RouterSploit! Read more about RouterSploit: The Metasploit For Routers!