Tai-e : A New Efficient Static Analysis Framework For Java

Tai-e (Chinese: 太阿; pronunciation: [ˈtaɪə:]) is a new static analysis framework for Java (please see our technical report for details), which features arguably the “best” designs from both the novel ones we proposed and those of classic frameworks such as Soot, WALA, Doop, and SpotBugs. Tai-e is easy-to-learn, easy-to-use, efficient, and highly extensible, allowing you […]

February 17, 2023
Read More >>

Readline crime: exploiting a SUID logic bug

By roddux // Rory M I discovered a logic bug in the readline dependency partially reveals file information when parsing the file specified in the INPUTRC environment variable. This could allow attackers to move laterally on a box where sshd is running, a given user is able to login, and the user’s private key is […]

February 16, 2023
Read More >>

APTRS : Automated Penetration Testing Reporting System

APTRS (Automated Penetration Testing Reporting System) is an automated reporting tool in Python and Django. The tool allows Penetration testers to create a report directly without using the Traditional Docx file. It also provides an approach to keeping track of the projects and vulnerabilities. Read Documentation here. Prerequisites Installation The tool has been tested using […]

February 16, 2023
Read More >>

Hack The Box: Photobomb Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Photobomb Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the PhotoBomb machine? For the user flag, you will need to find credentials which saved inside a JavaScript file. It will […]

The post Hack The Box: Photobomb Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

February 12, 2023
Read More >>