<p>Protecting your digital assets with cutting-edge technology.</p>
<ahref="#services"class="btn">Learn More</a>
</div>
</section>
<sectionid="services"class="services">
<divclass="container">
<h2>Our Services</h2>
<divclass="service-item">
<h3>Bug Bounty</h3>
<p>Our members have found sophisticated chains. And bugs in websites you've almost definitely used. Feel free to invite us to private programs.</p>
</div>
<divclass="service-item">
<h3>Pentesting</h3>
<p>We will audit an asset, and report to you all security issues we find. Whether it be outdated versions, bugs in custom code, misconfiguration etc. </p>
</div>
<divclass="service-item">
<h3>Tool Development</h3>
<p>Malectrica pride ourselves on our innovative tooling. In everything we create we seek to stand out. Our tooling is FOSS and available mostly via github and PyPi.</p>
</div>
<divclass="service-item">
<h3>SE Training</h3>
<p>We will audit a set of employees to assess their awareness around SE campaigns. Then demonstrate how to detect deceptive interactions.</p>
</div>
</div>
</section>
<sectionid="about"class="about">
<divclass="container">
<h2>About Us</h2>
<p>With several decades of combined experience. Malectrica is an organisation founded on the principals of innovation.</p>
<p>Malectrica pride ourselves on our innovative tooling. In everything we create we seek to stand out.</p>
<p>This same creativity focussed ethos extends to our security research work, where we use it to find obscure chains and escalate impact.</p>
<p>Multi threaded hash cracker with support for md5 and sha. Generates sqlite dbs to act as rainbow tables on first run through a wordlist. On every following run the rainbowtable will be used for near instant hash retrieval.</p>
<p>0 interaction privesc is always desired but not always achievable. For this reason, we have created a tool for the most trivial non-0-interaction privesc in history (with a few drawbacks). This is not an exploit just a cheap but effective trick. The usecase is when you have a shell on a sudoers account but no sudo cred. It works by manipulating sudo via aliasing in their .bashrc file to prepend a malicious attacker specified command first in the background. This does mean you will need to wait for sudo to be executed.</p>
<p>Balsamic is a library for sending malicious pickles to a vunlerable application, via web requests, or a malicious server or client we will add more payloads but for now we just execute shell commands, via the oscmd payload.</p>