Update index.html

main
Saltine 2024-06-24 15:35:40 -07:00 committed by GitHub
parent b72260bf72
commit 3f5d29e027
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 10 additions and 10 deletions

View File

@ -4,8 +4,8 @@
<meta charset="UTF-8"> <meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Malectrica - Cybersecurity Solutions</title> <title>Malectrica - Cybersecurity Solutions</title>
<link rel="icon" type="image/png" href="icotrp.png"> <link rel="icon" type="image/png" href="./images/icotrp.png">
<link rel="stylesheet" href="style.css"> <link rel="stylesheet" href="./style.css">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css"> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css">
<script type="text/javascript" src="https://cdn.jsdelivr.net/npm/@emailjs/browser@4/dist/email.min.js"></script> <script type="text/javascript" src="https://cdn.jsdelivr.net/npm/@emailjs/browser@4/dist/email.min.js"></script>
<script type="text/javascript"> <script type="text/javascript">
@ -32,7 +32,7 @@
<body> <body>
<header class="header"> <header class="header">
<div class="container"> <div class="container">
<img src="logotrp.svg" alt="Malectrica Logo"> <img src="./images/logotrp.svg" alt="Malectrica Logo">
<nav> <nav>
<ul> <ul>
<li><a href="#home">Home</a></li> <li><a href="#home">Home</a></li>
@ -85,12 +85,12 @@
<p>This same creativity focussed ethos extends to our security research work, where we use it to find obscure chains and escalate impact.</p> <p>This same creativity focussed ethos extends to our security research work, where we use it to find obscure chains and escalate impact.</p>
<div class="team"> <div class="team">
<div class="team-member"> <div class="team-member">
<img src="me.png" alt="Team Member"> <img src="./images/me.png" alt="Team Member">
<h3>Witchdoc</h3> <h3>Witchdoc</h3>
<p>Co-Founder</p> <p>Co-Founder</p>
</div> </div>
<div class="team-member"> <div class="team-member">
<img src="proleet.png" alt="Team Member"> <img src="./images/proleet.png" alt="Team Member">
<h3>Proleetariat</h3> <h3>Proleetariat</h3>
<p>Co-Founder</p> <p>Co-Founder</p>
</div> </div>
@ -117,7 +117,7 @@
<div class="container"> <div class="container">
<h2>Bugs We Found</h2> <h2>Bugs We Found</h2>
<div class="bug-item"> <div class="bug-item">
<img src="hfjkshjkfasd.png" alt="Affected Company Logo"> <img src="./images/hfjkshjkfasd.png" alt="Affected Company Logo">
<h3>Fixed Race - a Foxycart chain</h3> <h3>Fixed Race - a Foxycart chain</h3>
<p>[redacted] -> [redacted] . Leading to [redacted] .</p> <p>[redacted] -> [redacted] . Leading to [redacted] .</p>
<a href="https://bountyplatform.com/report/1" target="_blank" class="btn">View Report</a> <a href="https://bountyplatform.com/report/1" target="_blank" class="btn">View Report</a>
@ -136,28 +136,28 @@
<div class="container"> <div class="container">
<h2>Tools and Packages</h2> <h2>Tools and Packages</h2>
<div class="tool-item"> <div class="tool-item">
<img src="rainbow.webp" alt="Tool Logo" class="tool-logo"> <img src="./images/rainbow.webp" alt="Tool Logo" class="tool-logo">
<h3>Rainbownator</h3> <h3>Rainbownator</h3>
<p>Multi threaded hash cracker with support for md5 and sha. Generates sqlite dbs to act as rainbow tables on first run through a wordlist. On every following run the rainbowtable will be used for near instant hash retrieval.</p> <p>Multi threaded hash cracker with support for md5 and sha. Generates sqlite dbs to act as rainbow tables on first run through a wordlist. On every following run the rainbowtable will be used for near instant hash retrieval.</p>
<a href="https://github.com/malectricasoftware/rainbownator" target="_blank" class="btn">More Details</a> <a href="https://github.com/malectricasoftware/rainbownator" target="_blank" class="btn">More Details</a>
<a href="https://github.com/malectricasoftware/rainbownator" target="_blank" class="btn">Download</a> <a href="https://github.com/malectricasoftware/rainbownator" target="_blank" class="btn">Download</a>
</div> </div>
<div class="tool-item"> <div class="tool-item">
<img src="sunami.webp" alt="Package Logo" class="tool-logo"> <img src="./images/sunami.webp" alt="Package Logo" class="tool-logo">
<h3>SUnami</h3> <h3>SUnami</h3>
<p>0 interaction privesc is always desired but not always achievable. For this reason, we have created a tool for the most trivial non-0-interaction privesc in history (with a few drawbacks). This is not an exploit just a cheap but effective trick. The usecase is when you have a shell on a sudoers account but no sudo cred. It works by manipulating sudo via aliasing in their .bashrc file to prepend a malicious attacker specified command first in the background. This does mean you will need to wait for sudo to be executed.</p> <p>0 interaction privesc is always desired but not always achievable. For this reason, we have created a tool for the most trivial non-0-interaction privesc in history (with a few drawbacks). This is not an exploit just a cheap but effective trick. The usecase is when you have a shell on a sudoers account but no sudo cred. It works by manipulating sudo via aliasing in their .bashrc file to prepend a malicious attacker specified command first in the background. This does mean you will need to wait for sudo to be executed.</p>
<a href="https://github.com/malectricasoftware/SUnami" target="_blank" class="btn">More Details</a> <a href="https://github.com/malectricasoftware/SUnami" target="_blank" class="btn">More Details</a>
<a href="https://github.com/malectricasoftware/SUnami" target="_blank" class="btn">Download</a> <a href="https://github.com/malectricasoftware/SUnami" target="_blank" class="btn">Download</a>
</div> </div>
<div class="tool-item"> <div class="tool-item">
<img src="browser.webp" alt="Tool Logo" class="tool-logo"> <img src="./images/browser.webp" alt="Tool Logo" class="tool-logo">
<h3>BrowserBrute</h3> <h3>BrowserBrute</h3>
<p>Online bruteforcing tool based on selenium.</p> <p>Online bruteforcing tool based on selenium.</p>
<a href="https://github.com/malectricasoftware/BrowserBrute" target="_blank" class="btn">More Details</a> <a href="https://github.com/malectricasoftware/BrowserBrute" target="_blank" class="btn">More Details</a>
<a href="https://github.com/malectricasoftware/BrowserBrute" target="_blank" class="btn">Download</a> <a href="https://github.com/malectricasoftware/BrowserBrute" target="_blank" class="btn">Download</a>
</div> </div>
<div class="tool-item"> <div class="tool-item">
<img src="balsamic.webp" alt="Tool Logo" class="tool-logo"> <img src="./images/balsamic.webp" alt="Tool Logo" class="tool-logo">
<h3>Balsamic</h3> <h3>Balsamic</h3>
<p>Balsamic is a library for sending malicious pickles to a vunlerable application, via web requests, or a malicious server or client we will add more payloads but for now we just execute shell commands, via the oscmd payload.</p> <p>Balsamic is a library for sending malicious pickles to a vunlerable application, via web requests, or a malicious server or client we will add more payloads but for now we just execute shell commands, via the oscmd payload.</p>
<a href="https://github.com/malectricasoftware/balsamic" target="_blank" class="btn">More Details</a> <a href="https://github.com/malectricasoftware/balsamic" target="_blank" class="btn">More Details</a>