A proof-of-concept C2 framework that leverages the Google Calendar API as a covert communication channel between operators and a compromised system. And it works.
Deriv security team recently uncovered a macOS malware campaign targeting developers - using a fake Homebrew install script, a malicious Google ad, and a spoofed GitHub page.
Broken down in the blog
Worth a read.
I coded this over the weekend. It's my first hands-on experience with Golang, and I had fun.
This basically scrapes the RSS feed from vuldb.com and notifies on Slack when any CVEs matching the keywords are added.
Keywords can be any technology or product that you want to track, e.g., CVEs related to Apple, WordPress, Ivanti VPN, etc.
The intended users are bug bounty hunters who want to look out for interesting CVEs and organizations that want to take action when any CVE affecting them is released.
Feedback and criticism are always welcome.
Ideally, I would like to scrape the NVD API instead of vuldb, but I will work on that later.