This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!
Yes, I've seen this one and a few others as well. However, they all just made small changes just to have something different. I haven't seen any particularly good ideas (at least in my opinion). By the way, I also created a Flask project on the same topic, which you can see here...
Yes, exactly—I wanted the script to focus on this topic, but the mention of DimmuBurgor r was interesting. I’m now working on the next update based on this scenario, and if you have any other ideas for the next update, please let me know! Anyway, thank you and everyone else 🫀
Updates:
Added Repository Search by Keywords: You can now search for repositories using specific keywords.
Added README.md: Documentation has been included to help you get started.
You can now find this on GitHub. Happy hacking!
README.md
Ghost-CVE
GitHub CVE Repository Hunt
Hey hackers...
Greetings to all those who are always eager to hunt for new security vulnerabilities and ensure the best possible security. Here is GhostCVE Finder, a tool designed to search and discover new CVEs via GitHub. Leveraging the powerful GitHub API and robust Python libraries, this script enables you...
The recent Syniverse outage reaked havoc on global communication, and while they blame a simple config error at a peering partner, the scent of a more elaborate attack lingers. Here's why:
The Telltale Signs of a Traffic Flood: The outage smacked of a Distributed Denial-of-Service (DDoS)...
It's good. right from the beginning of the article, and in the poster and title of the article, I stated that it's for beginners. It shouldn't be implemented with all advanced methods right now. we should always start with less. slowly, slowly, not rushing to the top step, I've only outlined a...
Thanks for your feedback! yes, you’re right that modern antivirus solutions are very fast, and the probability of detection increases when an executable file touches the disk. However, this article was only meant to show the basic principles and a simple PoC. In reality, we use more...
you are right. The concept of this article is to be able to hide malware as much as possible, and one of the methods is to store them in the temp file, and this is an example implemented for very simple purposes. :smile10:
Hello dear users, today I have prepared an introductory article about fileless malware for you. I hope this article is good and efficient and will help newbies, and in the next parts I will talk more about the methods of this type of malware.
What is fileless malware?
ak in-memory malware ,aka...