[Tools] JDomRev In-Browser DOM Injection and Tampering Tool for Offensive Security
https://github.com/h0ffy/JDomRev
30 Apr 2025 12:09
https://github.com/h0ffy/JDomRev
28 Jan 2025 05:50
Public repository of public code on GitHub for the initial implementation tests of the Perceptron in C++. Soon, I will make more commits with the implementation reduced to C. Afterwards, I will explore libraries, frameworks, and tools in C/C++ for AI development, and look for optimization possibilities using AVX, MMX, SSE, SIMD, etc., with NASM, MASM, and/or C Inline Assembly.
26 Jan 2025 08:33
My glossary is just a list of word to avoid code break in translation process from English to Spanish. I've publish inna GitHub: ("https://github.com/JennyLab/JennyGlossarySpanishLang").
2 Jan 2025 13:16
A recently identified malware campaign demonstrates a noteworthy discrepancy between the sophistication of its distribution vector and the relative simplicity of its final payload. Although the malware itself appears rudimentary compressed ZIP file requiring user actions to disable antivirus its deployment strategy is alarmingly refined. The threat actors have fabricated a convincing Google Colab download interface and Reddit like a portal to lure victims into trusting and executing the malicious file.
30 Dec 2024 22:06
In this document, we will explore how to use VBA (Visual Basic for Applications) and VBScript to automate tasks and manipulate Word documents. These scripting languages are powerful tools for developers and IT professionals seeking to automate repetitive processes and increase efficiency in document management. Moreover, we will delve into scenarios related to Red Team and security testing, demonstrating how these technologies can be used both legitimately and, eventually, in threat-simulation contexts.
30 Dec 2024 19:36
I uncovered a malicious OCR app in the Microsoft Store, linked to organized campaigns from China targeting developers. These threats use tools like fake VSCode extensions to steal credentials, compromise projects, and create system backdoors. Vigilance and measures like pre-scan tools and regular audits are vital, even on trusted platforms.
3 Sept 2020 19:36
Over four years ago, at JennyLab, we identified a previously unknown zero-day vulnerability in Immunity Debugger, which has remained unreported to this day. This critical security flaw enables arbitrary code execution, allowing an attacker to run a binary without triggering Immunity Debugger’s debugging mode.