The main idea behind this project is to create corrupt but structurally valid media files, direct them to the appropriate software components in Android to be decoded and/or played and monitor the system for potential issues (i.e system crashes) that may lead to exploitable vulnerabilities. Custom developed Python scripts are used to send the malformed data across a distributed infrastructure of Android devices, log the findings and monitor for possible issues, in an automated manner. The actual decoding of the media files on the Android devices is done using the Stagefright command line interface. The results are sorted out, in an attempt to find only the unique issues, using a custom built triage mechanism.
FEATURES
ALTERNATIVES
Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.
A customized Kali Linux distribution for ICS/SCADA pentesting professionals
A guide to bypassing RFID card reader security mechanisms using specialized hardware
Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.
A modern post-exploitation command and control framework with a client-server architecture and extensibility features.
Open-source Java application for creating proxies for traffic analysis & modification.
A blog post discussing the often overlooked dangers of CSV injection in applications.
A next generation version of enum4linux with enhanced features for enumerating information from Windows and Samba systems.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.