Avatar
CrowdCyber
36f403b6512d7e69bb7b89442ce43ffa63cdf6ead2641d7935b239e2ec3557ad
Revolutionizing and Democratizing Cybersecurity

Cybersecurity researchers spotted a new malware-as-a-service (MaaS) called BunnyLoader that’s appeared in the threat landscape. https://securityaffairs.com/151869/malware/bunnyloader-maas.html?amp=1

Fully Integrated Adversarial Operations Toolkit (C2, stagers, agents, ephemeral infrastructure, phishing engine, and automation) https://github.com/malcomvetter/Periscope

FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool https://github.com/FalconForceTeam/FalconHound

POSTDump: Another tool to perform minidump of LSASS process using few technics to avoid detection. https://github.com/YOLOP0wn/POSTDump

ShellTorch: Multiple Critical Vulnerabilities in PyTorch Model Server (TorchServe) (CVSS 9.9, CVSS 9.8) Threatens Countless AI Users - Immediate Action Required https://www.oligo.security/blog/shelltorch-torchserve-ssrf-vulnerability-cve-2023-43654

Persistent Threat: New Exploit Puts Thousands of GitHub Repositories and Millions of Users at Risk https://checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-github-repositories-and-millions-of-users-at-risk/

Cybersecurity researchers spotted a new malware-as-a-service (MaaS) called BunnyLoader that’s appeared in the threat landscape. https://securityaffairs.com/151869/malware/bunnyloader-maas.html?amp=1

CVE-2023-36874: proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Windows Error Reporting (WER) https://github.com/d0rb/CVE-2023-36874

CVE-2023-36874: proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Windows Error Reporting (WER) https://github.com/d0rb/CVE-2023-36874