AutoPwnKey: An Evasive Red Teaming Framework

Source AutoPwnKey is an open-source red teaming framework and testing tool developed by CroodSolutions, leveraging AutoHotKey (AHK) for its evasive capabilities. The project aims to raise awareness about the security risks posed by scripting languages like AHK and AutoIT, which are often overlooked by traditional security solutions. Designed to aid red teams in penetration testing, Read More …

GitHub Actions Supply Chain Attack

Source The recent GitHub Actions supply chain attack represents a multi-layered, targeted compromise that initially focused on Coinbase before escalating into a widespread incident affecting thousands of repositories. This sophisticated attack exploited critical CI/CD misconfigurations and leveraged leaked Personal Access Tokens (PATs) to gain unauthorized access, potentially leading to data breaches and code tampering. The Read More …

Notes :: SCIM Hunting

In the blog post “SCIM Hunting,” the author explores the Security Assertion Markup Language (SAML) and System for Cross-domain Identity Management (SCIM) protocols, which are essential for managing user identities and access in cloud environments. For someone new to IT, understanding these protocols is crucial, as they play a significant role in ensuring secure access Read More …

Navigating the Challenges of Containers and Kubernetes Deployment

Containers and Kubernetes present several limitations and challenges that organizations must consider. One significant issue is platform complexity. While these technologies are versatile, they are not always necessary for every application. For instance, using Kubernetes to orchestrate static Commercial Off-The-Shelf (COTS) applications can be excessive, as the complexity of Kubernetes may outweigh any potential business Read More …

DMTA – Pearl Jam – Ten

Reflecting on Pearl Jam’s Ten This album holds a special place in my heart from my college years. I listened to it on repeat for quite some time, and while I wasn’t deeply immersed in the grunge scene, Ten became a significant part of my musical journey. It represents a specific moment in my life, Read More …

Perfecting Snare Delay Timing for a Cohesive Mix

To achieve a polished mix, it’s essential to time your free delay to the BPM of your song. This ensures that the delay complements the snare without clouding the overall sound. Avoid processing the snare drums separately from the other instruments, as this can disrupt the cohesion of your mix. To get the timing just Read More …

Notes – AWS Firewall policies

In AWS, AWS Network Firewall policies control firewall rules, defining the monitoring and protection behavior for a firewall by using rule groups and policy default settings. Here’s a more detailed explanation: Firewall Policy: This defines the monitoring and protection behavior for a firewall, specifying how traffic is handled. Rule Groups: These are collections of rules that define the Read More …