PRINT
PRINT
SEND MAIL
SEND MAIL

CobaltStrikeScan – Scan Files Or Process Memory For CobaltStrike Beacons And Parse Their Configuration

Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence of DLL injection (classic or reflective injection) and performs a YARA scan on the target process' memory ...

Continue reading

SkyArk – Helps To Discover, Assess And Secure The Most Privileged Entities In Azure And AWS

SkyArk is a cloud security project with two main scanning modules:AzureStealth - Scans Azure environmentsAWStealth - Scan AWS environmentsThese two scanning modules will discover the most privileged entities in the target AWS and Azure.The Main Goal ...

Continue reading

Spray – A Password Spraying Tool For Active Directory Credentials By Jacob Wilkin(Greenwolf)

A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)Getting StartedThese instructions will show you the requirements for and how to use Spray.PrerequisitesAll requirements come preinstalled on Kali Linux, to run on other...

Continue reading

Karonte – A Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware.Research paperWe present our approach and the findings of this work in the following research paper:KARONTE: Detecting Insecure Multi-binary Interactions in E...

Continue reading

CyberRange – The Open-Source AWS Cyber Range

This CyberRange project represents the first open-source Cyber Range blueprint in the world.This project provides a bootstrap framework for a complete offensive, defensive, reverse engineering, & security intelligence tooling in a private research ...

Continue reading

IoT-Implant-Toolkit – Toolkit For Implant Attack Of IoT Devices

IoT-Implant-Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port debugging, software analysis and stable spy clients. With a...

Continue reading

ACT Platform – Open Platform For Collection And Exchange Of Threat Intelligence Information

Semi-Automated Cyber Threat Intelligence (ACT) is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security Authority (NSM), KraftCERT and Nordic Financial CERT.The main objective of the ACT project ...

Continue reading

©2021 By Cyber Sec Labs

   

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account