Update index.html
parent
b72260bf72
commit
3f5d29e027
20
index.html
20
index.html
|
@ -4,8 +4,8 @@
|
|||
<meta charset="UTF-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<title>Malectrica - Cybersecurity Solutions</title>
|
||||
<link rel="icon" type="image/png" href="icotrp.png">
|
||||
<link rel="stylesheet" href="style.css">
|
||||
<link rel="icon" type="image/png" href="./images/icotrp.png">
|
||||
<link rel="stylesheet" href="./style.css">
|
||||
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css">
|
||||
<script type="text/javascript" src="https://cdn.jsdelivr.net/npm/@emailjs/browser@4/dist/email.min.js"></script>
|
||||
<script type="text/javascript">
|
||||
|
@ -32,7 +32,7 @@
|
|||
<body>
|
||||
<header class="header">
|
||||
<div class="container">
|
||||
<img src="logotrp.svg" alt="Malectrica Logo">
|
||||
<img src="./images/logotrp.svg" alt="Malectrica Logo">
|
||||
<nav>
|
||||
<ul>
|
||||
<li><a href="#home">Home</a></li>
|
||||
|
@ -85,12 +85,12 @@
|
|||
<p>This same creativity focussed ethos extends to our security research work, where we use it to find obscure chains and escalate impact.</p>
|
||||
<div class="team">
|
||||
<div class="team-member">
|
||||
<img src="me.png" alt="Team Member">
|
||||
<img src="./images/me.png" alt="Team Member">
|
||||
<h3>Witchdoc</h3>
|
||||
<p>Co-Founder</p>
|
||||
</div>
|
||||
<div class="team-member">
|
||||
<img src="proleet.png" alt="Team Member">
|
||||
<img src="./images/proleet.png" alt="Team Member">
|
||||
<h3>Proleetariat</h3>
|
||||
<p>Co-Founder</p>
|
||||
</div>
|
||||
|
@ -117,7 +117,7 @@
|
|||
<div class="container">
|
||||
<h2>Bugs We Found</h2>
|
||||
<div class="bug-item">
|
||||
<img src="hfjkshjkfasd.png" alt="Affected Company Logo">
|
||||
<img src="./images/hfjkshjkfasd.png" alt="Affected Company Logo">
|
||||
<h3>Fixed Race - a Foxycart chain</h3>
|
||||
<p>[redacted] -> [redacted] . Leading to [redacted] .</p>
|
||||
<a href="https://bountyplatform.com/report/1" target="_blank" class="btn">View Report</a>
|
||||
|
@ -136,28 +136,28 @@
|
|||
<div class="container">
|
||||
<h2>Tools and Packages</h2>
|
||||
<div class="tool-item">
|
||||
<img src="rainbow.webp" alt="Tool Logo" class="tool-logo">
|
||||
<img src="./images/rainbow.webp" alt="Tool Logo" class="tool-logo">
|
||||
<h3>Rainbownator</h3>
|
||||
<p>Multi threaded hash cracker with support for md5 and sha. Generates sqlite dbs to act as rainbow tables on first run through a wordlist. On every following run the rainbowtable will be used for near instant hash retrieval.</p>
|
||||
<a href="https://github.com/malectricasoftware/rainbownator" target="_blank" class="btn">More Details</a>
|
||||
<a href="https://github.com/malectricasoftware/rainbownator" target="_blank" class="btn">Download</a>
|
||||
</div>
|
||||
<div class="tool-item">
|
||||
<img src="sunami.webp" alt="Package Logo" class="tool-logo">
|
||||
<img src="./images/sunami.webp" alt="Package Logo" class="tool-logo">
|
||||
<h3>SUnami</h3>
|
||||
<p>0 interaction privesc is always desired but not always achievable. For this reason, we have created a tool for the most trivial non-0-interaction privesc in history (with a few drawbacks). This is not an exploit just a cheap but effective trick. The usecase is when you have a shell on a sudoers account but no sudo cred. It works by manipulating sudo via aliasing in their .bashrc file to prepend a malicious attacker specified command first in the background. This does mean you will need to wait for sudo to be executed.</p>
|
||||
<a href="https://github.com/malectricasoftware/SUnami" target="_blank" class="btn">More Details</a>
|
||||
<a href="https://github.com/malectricasoftware/SUnami" target="_blank" class="btn">Download</a>
|
||||
</div>
|
||||
<div class="tool-item">
|
||||
<img src="browser.webp" alt="Tool Logo" class="tool-logo">
|
||||
<img src="./images/browser.webp" alt="Tool Logo" class="tool-logo">
|
||||
<h3>BrowserBrute</h3>
|
||||
<p>Online bruteforcing tool based on selenium.</p>
|
||||
<a href="https://github.com/malectricasoftware/BrowserBrute" target="_blank" class="btn">More Details</a>
|
||||
<a href="https://github.com/malectricasoftware/BrowserBrute" target="_blank" class="btn">Download</a>
|
||||
</div>
|
||||
<div class="tool-item">
|
||||
<img src="balsamic.webp" alt="Tool Logo" class="tool-logo">
|
||||
<img src="./images/balsamic.webp" alt="Tool Logo" class="tool-logo">
|
||||
<h3>Balsamic</h3>
|
||||
<p>Balsamic is a library for sending malicious pickles to a vunlerable application, via web requests, or a malicious server or client we will add more payloads but for now we just execute shell commands, via the oscmd payload.</p>
|
||||
<a href="https://github.com/malectricasoftware/balsamic" target="_blank" class="btn">More Details</a>
|
||||
|
|
Loading…
Reference in New Issue