

The small form factor MITM - Network TAP
By Mo’men El-Rashidi TAPPERThe idea was to create a small formfactor MITM - Network TAP that combined with Wireshark and some proper optional Plugins, can go on undetected on any network, whether it’s a switch to switch, router to switch, or intermediary actor between PC’s.Which doesn’t consume power - Completely passive -, is Plug n’ Play,comes in handy f..
Read more

From BioTime To System
By Fady Moheb What is BioTime ? BioTime is a powerful time and attendance management software that provides a stable connection with up to thousands of ZKTeco’s standalone push communication devices through Ethernet/ WIFI/ 3G/ 4G and works as a private cloud to offer employee self-service by mobile application and web browser.As we see BioT..
Read more

BEB [Bypassing Entry Barriers] - Hacking Forward with Pivoting Guide
By Fady Moheb RequirementsRouting is one of the most concepts we should be aware if you’re in the security field but I will explain some important topics that I need u to understand more in deep Can you reach me ?I will build a real-world scenario with you step by step because if you want to make yours, let’s start. As you see we build a topology to u..
Read more

Zero Glow
By Fady Moheb What is Glowroot ?Glowroot is an open-source Application Performance Monitoring (APM) tool for Java applications. It runs as a lightweight Java agent and collects detailed data about transactions, JVM performance, SQL queries and errors, usually with very low overhead in production environments. It is mainly used to monitor the performance an..
Read more

Practical macOS Security Researcher Notes and Guide (OSMR)
By Zeyad Azima MacOS ArchitectureIntroduction 1. Application Layer AppKit: Facilitates the creation of desktop application interfaces, handling events, drawing operations, and user interface elements like buttons and text fields. For example, when you create a new document in TextEdit, AppKit is responsible for displaying the window, text editing area, an..
Read more

Windows Defense Evasion Guide
By Fady Moheb Antimalware Scan Interface [ AMSI ]Antimalware Scan Interface [ AMSI ] is. Microsoft developed it to provide a set of API calls for applications, including any third-party applications, to perform a signature-based scan of the content. Windows Defender uses it to scan PowerShell scripts, .NET, VBA macros, Windows Script Host (WSH), VBScript, ..
Read more

macOS Shellcoding in depth on x86_6
By Zeyad Azima IntroductionThis guide explores shellcoding on the x86_64 architecture for macOS, bypassing the traditional x86 starting point for a practical reason: with the release of macOS 10.15 (Catalina), Apple discontinued support for 32-bit applications entirely. Since x86_64 maintains backward compatibility with x86 code anyway, focusing on 64-bit ..
Read more

Bypass 2 RCE: Apache HugeGraph Server
By Zeyad Azima IntroductionDuring my ongoing security research into Apache products, specifically focusing on Remote Code Execution (RCE) vulnerabilities, I discovered a fascinating and critical flaw in Apache HugeGraph Server’s latest version(1.5.0). This vulnerability represents a unique case where the same malicious payload that gets consistently blocke..
Read more

We are ARMed no more ROPpery Here
By Zeyad Azima IntroductionIn 2017, ARM introduced Pointer Authentication (PAC) as part of its ARMv8.3-A architecture updates. This groundbreaking solution aimed to tackle one of the most critical challenges in software security: memory corruption vulnerabilities. By leveraging cryptographic techniques, PAC made it significantly harder for attackers to tam..
Read more

CVE Analysis: Hacking a Crypto Network for Profit
By Zeyad Azima IntroductionWelcome, everyone. In this blog post, I will share the story of how, in June 2023, I successfully dumped the database of a crypto network, ultimately leading to the ability to achieve remote code execution. This was accomplished during my research and analysis of a CVE affecting one of Apache’s products. About the CVECVE-2022-227..
Read more