website/index.html

209 lines
10 KiB
HTML

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Malectrica - Cybersecurity Solutions</title>
<link rel="icon" type="image/png" href="./images/icotrp.png">
<link rel="stylesheet" href="./style.css">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css">
<script type="text/javascript" src="https://cdn.jsdelivr.net/npm/@emailjs/browser@4/dist/email.min.js"></script>
<script type="text/javascript">
(function() {
emailjs.init({
publicKey: "D3W5VU1ktgPoX-knR",
});
})();
</script>
<script type="text/javascript">
window.onload = function() {
document.getElementById('contact-form').addEventListener('submit', function(event) {
event.preventDefault();
emailjs.sendForm('service_pu7s79i', 'template_dfpwuur', this)
.then(function(response) {
console.log('SUCCESS!', response.status, response.text);
}, function(error) {
console.log('FAILED...', error);
});
});
}
</script>
</head>
<body>
<header class="header">
<div class="container">
<a href="./#home"><img src="./images/logotrp.svg" alt="Malectrica Logo"></a>
<nav>
<ul>
<li><a href="#home">Home</a></li>
<li><a href="#services">Services</a></li>
<li><a href="#about">About</a></li>
<li><a href="#blog">Blog</a></li>
<li><a href="#bugs">Bugs</a></li>
<li><a href="#tools-packages">Tools</a></li>
<li><a href="#contact">Contact</a></li>
</ul>
</nav>
</div>
</header>
<section id="home" class="hero">
<div class="container">
<h2>Your Cybersecurity Partner</h2>
<p>Protecting your digital assets with cutting-edge technology.</p>
<a href="#services" class="btn">Learn More</a>
</div>
</section>
<section id="services" class="services">
<div class="container">
<h2>Our Services</h2>
<div class="service-item">
<h3>Bug Bounty</h3>
<p>Our members have found sophisticated chains. And bugs in websites you've almost definitely used. Feel free to invite us to private programs.</p>
</div>
<div class="service-item">
<h3>Pentesting</h3>
<p>We will audit an asset, and report to you all security issues we find. Whether it be outdated versions, bugs in custom code, misconfiguration etc. </p>
</div>
<div class="service-item">
<h3>Tool Development</h3>
<p>Malectrica pride ourselves on our innovative tooling. In everything we create we seek to stand out. Our tooling is FOSS and available mostly via github and PyPi.</p>
</div>
<div class="service-item">
<h3>SE Training</h3>
<p>We will audit a set of employees to assess their awareness around SE campaigns. Then demonstrate how to detect deceptive interactions.</p>
</div>
</div>
</section>
<section id="about" class="about">
<div class="container">
<h2>About Us</h2>
<p>With several decades of combined experience. Malectrica is an organisation founded on the principals of innovation.</p>
<p>Malectrica pride ourselves on our innovative tooling. In everything we create we seek to stand out.</p>
<p>This same creativity focussed ethos extends to our security research work, where we use it to find obscure chains and escalate impact.</p>
<div class="team">
<div class="team-member">
<img src="./images/me.png" alt="Team Member">
<h3>Witchdoc</h3>
<p>Co-Founder</p>
</div>
<div class="team-member">
<img src="./images/proleet.png" alt="Team Member">
<h3>Proleetariat</h3>
<p>Co-Founder</p>
</div>
</div>
<div class="social-media">
<a href="https://github.com/malectricasoftware" target="_blank" class="social-link github"><i class="fa fa-github" style="font-size:36px"></i></a>
<a href="https://youtube.com/malectricasoftware" target="_blank" class="social-link twitter"><i class="fa fa-youtube-play" style="font-size:36px"></i></a>
<a href="https://www.linkedin.com/company/malectrica/" target="_blank" class="social-link linkedin"><i class="fa fa-linkedin" style="font-size:36px"></i></a>
</div>
</div>
</section>
<section id="blog" class="blog">
<div class="container">
<h2>Blog</h2>
<a href="./blog" class="blog-item">
<h3>Latest in Cybersecurity</h3>
<p>Stay updated with the latest trends and tips in cybersecurity.</p>
</a>
</div>
</section>
<section id="bugs" class="bugs">
<div class="container">
<h2>Bugs We Found</h2>
<div class="bug-item">
<img src="./images/hfjkshjkfasd.png" alt="Affected Company Logo">
<h3>Fixed Race - a Foxycart chain</h3>
<p>[redacted] -> [redacted] . Leading to [redacted] .</p>
<a href="https://bountyplatform.com/report/1" target="_blank" class="btn">View Report</a>
<a href="https://malectrica.com/blog/bug1" target="_blank" class="btn">Read Blog</a>
</div>
<div class="bug-item">
<img src="./images/unnamed(1).png" alt="Affected Company Logo">
<h3>The Manganelo Hack (Uncovering a Security Disaster)</h3>
<p>Multiple domains. Multiple critical vulnerabilities | Authors: WitchDocSec & Tonabrix1</p>
<a href="https://malectrica.com/blog/manganelo" class="btn">Read Blog</a>
</div>
<!-- Add more bug items as needed -->
<div class="bounty-profiles">
<p><b>Our Profiles:</b></p>
<a href="https://bugcrowd.com/malectrica" target="_blank" class="cool-btn">Bugcrowd</a>
<!-- Add more links as necessary -->
</div>
</div>
</section>
<section id="tools-packages" class="tools-packages">
<div class="container">
<h2>Tools and Packages</h2>
<div class="tool-item">
<img src="./images/rainbow.webp" alt="Tool Logo" class="tool-logo">
<h3>Rainbownator</h3>
<p>Multi threaded hash cracker with support for md5 and sha. Generates sqlite dbs to act as rainbow tables on first run through a wordlist. On every following run the rainbowtable will be used for near instant hash retrieval.</p>
<a href="https://github.com/malectricasoftware/rainbownator" target="_blank" class="btn">More Details</a>
<a href="https://github.com/malectricasoftware/rainbownator" target="_blank" class="btn">Download</a>
</div>
<div class="tool-item">
<img src="./images/sunami.webp" alt="Package Logo" class="tool-logo">
<h3>SUnami</h3>
<p>0 interaction privesc is always desired but not always achievable. For this reason, we have created a tool for the most trivial non-0-interaction privesc in history (with a few drawbacks). This is not an exploit just a cheap but effective trick. The usecase is when you have a shell on a sudoers account but no sudo cred. It works by manipulating sudo via aliasing in their .bashrc file to prepend a malicious attacker specified command first in the background. This does mean you will need to wait for sudo to be executed.</p>
<a href="https://github.com/malectricasoftware/SUnami" target="_blank" class="btn">More Details</a>
<a href="https://github.com/malectricasoftware/SUnami" target="_blank" class="btn">Download</a>
</div>
<div class="tool-item">
<img src="./images/browser.webp" alt="Tool Logo" class="tool-logo">
<h3>BrowserBrute</h3>
<p>Online bruteforcing tool based on selenium.</p>
<a href="https://github.com/malectricasoftware/BrowserBrute" target="_blank" class="btn">More Details</a>
<a href="https://github.com/malectricasoftware/BrowserBrute" target="_blank" class="btn">Download</a>
</div>
<div class="tool-item">
<img src="./images/balsamic.webp" alt="Tool Logo" class="tool-logo">
<h3>Balsamic</h3>
<p>Balsamic is a library for sending malicious pickles to a vunlerable application, via web requests, or a malicious server or client we will add more payloads but for now we just execute shell commands, via the oscmd payload.</p>
<a href="https://github.com/malectricasoftware/balsamic" target="_blank" class="btn">More Details</a>
<a href="https://github.com/malectricasoftware/balsamic" target="_blank" class="btn">Download</a>
</div>
<!-- Add more tool items as necessary -->
</div>
</section>
<section id="contact" class="contact">
<div class="container">
<h2>Contact Us</h2>
<form action="#" method="post" id="contact-form">
<input type="hidden" name="contact_number" value="697483">
<label for="name">Name:</label>
<input type="text" id="name" name="user_name">
<label for="email">Email:</label>
<input type="email" id="email" name="user_email">
<label for="message">Message:</label>
<textarea id="message" name="message"></textarea>
<button type="submit" class="btn">Submit</button>
</form>
</div>
</section>
<script>
document.getElementById('contact-form').addEventListener('submit', function(event) {
event.preventDefault();
this.reset();
});
</script>
<footer class="footer">
<div class="container">
<p>&copy; 2024 Malectrica | All rights reserved</p>
</div>
</footer>
<script src="scripts.js"></script>
</body>
</html>