Using WebDAV features as a covert channel involves leveraging the protocol's capabilities to deliver malicious payloads or establish C2 communication, overcoming challenges like bypassing IDS/IPS and AV, being proxy and DFIR friendly, and avoiding disk writes by working in memory.
Catch possible phishing domains in near real time by looking for suspicious TLS certificate issuances reported to the Certificate Transparency Log (CTL) via the CertStream API.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Extract local data storage of an Android application in one click.
Android application for learning about vulnerabilities in modern Android apps and testing pentesting skills.
GridPot is a cybersecurity tool that integrates GridLAB-D, Conpot, and libiec61850 to simulate and detect attacks on industrial control systems (ICS).
Python tool for monitoring user-select APIs in Android apps using Frida.
Verify scripts and executables to mitigate chain of supply attacks.
Introspy-Android is a blackbox tool for understanding Android app behavior and identifying security issues at runtime.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.