F-Secure LABS
- Basingstoke, Johannesburg, London, Manchester, Singapore, New York
- https://labs.f-secure.com/
Pinned repositories
Repositories
-
CVE-2021-25374_Samsung-Account-Access
This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.
-
drozer
The Leading Security Assessment Framework for Android.
-
awspx
A graph-based tool for visualizing effective access and resource relationships in AWS environments.
-
C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
-
keywe-tooling
Tools that can be used to interact with the KeyWe Smart Lock device.
-
leonidas
Automated Attack Simulation in the Cloud, complete with detection use cases.
-
bitlocker-spi-toolkit
Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.
-
Jamf-Attack-Toolkit
Suite of tools to facilitate attacks against the Jamf macOS management platform.
-
WindVision-PoC-app
A PoC Android application that exploits 4 vulnerabilities of the Wind Vision TV streaming application to achieve account takeover.
-
captcha22
CAPTCHA22 is a toolset for building, and training, CAPTCHA cracking models using neural networks.
-
z3_and_angr_binary_analysis_workshop
Code and exercises for a workshop on z3 and angr
-
SharpGPOAbuse
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by that GPO.
-
macOSTriageCollectionScript
A triage data collection script for macOS
-
drozer-agent
The Android Agent for the Mercury Security Assessment Framework.
-
CalendarPersist
JXA script to allow programmatic persistence via macOS Calendar.app alerts.
-
LinuxCatScale
Incident Response collection and processing scripts with automated reporting scripts
-
timeinator
Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.
-
dref
DNS Rebinding Exploitation Framework
-
N1QLMap
The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.
-
peas
PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.
-
Ninjasploit
A meterpreter extension for applying hooks to avoid windows defender memory scans
-
incognito
One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/
-
fdpasser
Example of passing file descriptors into a container to perform a privilege escalation on the host
-
physmem2profit
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely