Cyber Guardians – Telegram
Cyber Guardians
14.3K subscribers
86 photos
5 videos
36 files
3.26K links
RedTeaming TTPs
Bug Hunting
Web PenTest
Web Security
Binary Analysis
Exploit DEV
Malware DEV
Malware Analysis
BlueTeaming
Threat Hunting
SOC
CSIRT
FORENSICS
Open-Source Intelligence(OSINT)
Cybersec Tools
Download Telegram
CVE-2025-40554 – SolarWinds Web Help Desk

Auth Bypass PoC

@IRCyberGuardians
AudioDG Windows LPE

Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled Tasks.

Blog:
Abusing Windows Audio for Local Privilege Escalation

DLL hijacking in the context of the audiodg.exe process which may load vendor-supplied APO-related DLL dependencies from system paths. Through this it is possible to execute code as “NT AUTHORITY\LOCAL SERVICE” and subsequently escalate to SYSTEM using Scheduled Tasks and Potato techniques.

@IRCyberGuardians
https://github.com/zh54321/SharePointDumper

Enumerates all SharePoint sites/drives a user can access via Microsoft Graph, recursively downloads files, and logs every Graph + SharePoint HTTP request for SIEM correlation, detection engineering, and IR testing.

@IRCyberGuardians
Swarmer

A tool for stealthy modification of Windows 10/11 Registry as a low privilege user via offline hive manipulation, avoiding detection by EDRs.

The workflow is straightforward:
• Export the target user’s HKCU registry (via reg export or our
BOF-based approach)
• Make whatever modifications you want to the exported data
• Use Swarmer to convert the modified export into a binary hive
• Drop the resulting 
NTUSER.MAN file into the user’s profile directory
swarmer.exe exported.reg NTUSER.MAN


Or, if you want to add a startup entry in one shot:
swarmer.exe --startup-key "Updater" --startup-value "C:\Path\To\payload.exe" exported.reg NTUSER.MAN


Blog:
Corrupting the Hive Mind: Persistence Through Forgotten Windows Internals

@IRCyberGuardians
EDR-GhostLocker

AppLocker-Based EDR Neutralization

Blog:
AppLocker Rules Abuse

Threat actors could abuse AppLocker to deploy rules that will prevent EDR processes from execution in order to execute arbitrary commands and software on the asset without EDR disruption.

@IRCyberGuardians
A curated list of Remote Monitoring and Management (RMM) tools.

https://lolrmm.io/

@IRCyberGuardians
AutoPtT

Enumerates Kerberos tickets and performs Pass-the-Ticket (PtT) attacks interactively or step by step. It is a standalone alternative to Rubeus or Mimikatz.

• auto - Automated Pass-the-Ticket attack
• sessions - List logon sessions. Similar to running klist sessions
• klist - List tickets in the current session. Similar to running klist
• tickets - List tickets in all sessions (not only TGTs). Similar to running Rubeus.exe dump
• export - Export a TGT given the LogonId. Similar to running Rubeus.exe dump
• ptt - Import a ticket file given the file name. Similar to running Rubeus.exe ptt


Blog:
Automating the Pass-The-Ticket attack

@IRCyberGuardians
Building a CobaltStrike AggressorScript Bridge for Any Language
*
Link
+ agnoscript_middleware
iOS/macOS Critical DNG Image Processing Memory Corruption Exploitation https://pwn.guide/free/hardware/cve202543300

@IRCyberGuardians