so.cl

Rascals are always sociable, and the chief sign that a man has any nobility in his character is the little pleasure he takes in others company. Arthur Schopenhauer


Te puedes vender
Cualquier oferta es buena si quieres poder
Qué fácil es
Abrir tanto la boca para opinar. Héroes del Silencio, Entre Dos Tierras

GradeJS is an open-source project that allows you to analyze webpack production bundles without having access to the source code of a website. It detects a list of bundled NPM libraries and works even for minified or tree-shaken bundles. GradeJS: analyze webpack production bundles

Yes, western “journalism” is dead, how could you tell?

Developers for Android do a lot of work with files and exchange them with other apps, for example, to get photos, images, or user data. Developers often make typical mistakes that allow an attacker to gain access to the app’s internal files, which store sensitive data. This article describes the most typical mistakes developers make and gives the best advice on how to fix them. We will also show how Oversecured can discover all these types of errors. Android security checklist: theft of arbitrary files

Mip22 is a modern and advanced cyber security program for computers with GNU/Linux operating system and mobile phones and tablets with Android operating system, for educational purposes. mip22, an advanced phishing tool

Humans will always flock to the simplest, cheapest distractions available and towards the social setting which offers them most comfort with least investments required and lowest entry barrier available.

How I discovered the vulnerability in Huawei’s AppGallery, the consequences and what happened.

Back in February 2022, a developer I know released an app on the AppGallery. While looking at the listing of the app, I started wondering how Huawei’s API worked. After a few minutes, I finally figured out one API that took a package name as a parameter and returned a JSON object with the details of the app. At that point I didn’t know what I would find later on, so I just tried the API with the package name of a known free app: Huawei’s AppGallery itself. Vulnerability in Huawei’s AppGallery: can download paid apps for free

The Universe dreams through our dreams.

EMBA is designed as the central firmware analysis tool for penetration testers. It supports the complete security analysis process starting with the firmware extraction process, doing static analysis and dynamic analysis via emulation and finally generating a report. EMBA automatically discovers possible weak spots and vulnerabilities in firmware. Examples are insecure binaries, old and outdated software components, potentially vulnerable scripts or hard-coded passwords. EMBA is a command line tool with the option to generate an easy to use web report for further analysis.

EMBA combines multiple established analysis tools and can be started with one simple command. Afterwards it tests the firmware for possible security risks and interesting areas for further investigation. No manual installation of all helpers, once the integrated installation script has been executed, you are ready to test your firmware.

EMBA is designed to assist penetration testers and not as a standalone tool without human interaction. EMBA should provide as much information as possible about the firmware, that the tester can decide on focus areas and is responsible for verifying and interpreting the results. The security analyzer for embedded device firmware

Larascript is a script which take advantage from CVE-2018-15133 and can execute remote commands if a vulnerable Laravel app is exposed. You can send commands and get response such as get cat /etc/passwd. But you also can ask for a shell so it gives you a reverse shell.

It has some argument personalization so you can specify what type of reverse shell you get (bash or sh), what reverse shell language use to retrieve the shell (PHP, bash, mkfifo, Python…) or the Laravel RCE method (1,2,3 or 4). It also provides a good shell interaction and references to the shell treatment or Linux privilege escalation. CVE-2018-15133: Laravel RCE

In this list I decided to share most of the tools I utilize in authorized engagements, along with my personal ranking of their value based on their usage and for you to consider if they should be in your toolkit, including where to find some of them, and in some cases I will also include some other alternatives. My goal with this list is to help fellow Red Teamers with a ‘checklist’, for whenever they might be missing a tool, and use this list as a reference. Red Team - Physical Security

Reproducing is like involuntary manslaughter because from the moment of birth you’ve condemned someone new to death.

One of the most profound moral realization out there is that morality is a social construct that doesn’t tangibly exist in reality, a cultural fan-fiction on a grand scale.