EN | PL |
[ Oferta ] [ Blog ] [ Nasze Publikacje ] [ O Nas ]    |
In addition to offering penetration testing services members of Z-Labs are commited to conduct independent security research and development to constanly improve its R&D capabilities |
[ Nasze znaleziska ] In addition to discovering security issues and design flaws in properitary software for our clients, Z-Labs occasionally conducts its own vulnerability research on chosen open source software and performs other security research related activities. # Discovery of CVE-2017-17858 vulnerability - multiple memory corruptions during pdf processing Software affected: MuPDF (ver. 1.12.0) # Discovery of CVE-2015-3146 vulnerability - DoS condition (server-side NULL pointer dereference) Software affected: libssh (ver. < 0.6.5) # Discovery of CVE-2015-1782 vulnerability - remote out-of-bounds memory read Software affected: libssh2 (ver. <= 1.4.3) [ Nasze narzędzia ] At Z-Labs a lot of code is written: PoC exploits, custom fuzzers and other custom-written scripts. We release some of them to share with the community. # bof-launcher - Beacon Object Files (BOF) launching library
Open-source, cross-platform library for loading, relocating and launching BOFs on Windows and UNIX/Linux systems. # linux-exploit-suggester - Linux privilege escalation auditing tool Written to aid a security analyst in uncovering known and exploitable vulnerabilities in Linux kernel. # Exploits ported to Nmap Lua scripts contributed by us to Nmap network scanner. [ Nasze publikacje ] Ops-Sec for Penetration Testers and Red Team Operators - comming soon. |
Copyright (c) 2018-2024 Z-Labs