Custom Queries - Brought Up to BH4.1 syntax
https://github.com/ZephrFish/Bloodhound-CustomQueries
#bloodhound
https://github.com/ZephrFish/Bloodhound-CustomQueries
#bloodhound
GitHub
GitHub - ZephrFish/Bloodhound-CustomQueries: Custom Queries - Brought Up to BH4.1 syntax
Custom Queries - Brought Up to BH4.1 syntax. Contribute to ZephrFish/Bloodhound-CustomQueries development by creating an account on GitHub.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
پ.ن حملات LOLA حملاتی که از خودت سیستم عامل یا برنامه استفاده میشه برای عملیات مخرب هیچ چیز اضافه تری استفاده نمیشه اکثرا APT از این نوع حملات میزنن که بزرگ ترینشون Lazarus (کره شمالی)
https://encyclopedia.kaspersky.com/glossary/lotl-living-off-the-land/
ابزارها :
https://github.com/LOLBAS-Project/LOLBAS
#Redteam #LOLA #LOLbins #LOLnoscripts
پ.ن حملات LOLA حملاتی که از خودت سیستم عامل یا برنامه استفاده میشه برای عملیات مخرب هیچ چیز اضافه تری استفاده نمیشه اکثرا APT از این نوع حملات میزنن که بزرگ ترینشون Lazarus (کره شمالی)
https://encyclopedia.kaspersky.com/glossary/lotl-living-off-the-land/
ابزارها :
https://github.com/LOLBAS-Project/LOLBAS
#Redteam #LOLA #LOLbins #LOLnoscripts
Kaspersky
Living off the Land (LotL) attack
A Living off the Land (LotL) attack describes a cyberattack in which intruders use legitimate software and functions available in the system to perform malicious actions on it. Living off the land means surviving on what you can forage, hunt,
CodeCat is an open-source tool to help you find/track user input sinks and security bugs using static code analysis. These points follow regex rules.
https://github.com/CoolerVoid/codecat
#staticanalysis #codecat
https://github.com/CoolerVoid/codecat
#staticanalysis #codecat
Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.
https://github.com/Dramelac/GoldenCopy
https://github.com/Dramelac/GoldenCopy
GitHub
GitHub - Dramelac/GoldenCopy: Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.
Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket. - Dramelac/GoldenCopy
PoC for CVE-2022-21974 and CVE-2022-21971 Roaming Security Rights Management Services Remote Code Execution Vulnerability"
https://github.com/0vercl0k/CVE-2022-21971
https://github.com/0vercl0k/CVE-2022-21974
#RTF #wordpad #OFFICE #RCE
https://github.com/0vercl0k/CVE-2022-21971
https://github.com/0vercl0k/CVE-2022-21974
#RTF #wordpad #OFFICE #RCE
GitHub
GitHub - 0vercl0k/CVE-2022-21971: PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability" - 0vercl0k/CVE-2022-21971
کلیه اطلاعاتی که لیک شده اند:
https://share.vx-underground.org/Conti/
فقط دکریپتور:
https://anonfiles.com/l3b7n7L6xc/conti_locker_7z
لاکر با پسورد
https://anonfiles.com/lfV7c2L8xa/conti_locker_v2_zip
#conti
https://share.vx-underground.org/Conti/
فقط دکریپتور:
https://anonfiles.com/l3b7n7L6xc/conti_locker_7z
لاکر با پسورد
https://anonfiles.com/lfV7c2L8xa/conti_locker_v2_zip
#conti
Conti TTP
https://github.com/Res260/conti_202202_leak_procedures
https://github.com/soufianetahiria/ContiLeaks/blob/main/cobaltsrike_lolbins
https://github.com/Res260/conti_202202_leak_procedures
https://github.com/soufianetahiria/ContiLeaks/blob/main/cobaltsrike_lolbins
GitHub
GitHub - Res260/conti_202202_leak_procedures: This repository contains procedures found in the Feb 2022 conti leaks. They were…
This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in the leak and posted on may 10th, 2021 in the...
An unexpected Redis sandbox escape affecting only Debian, Ubuntu, and other derivatives
https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce
https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce
A newly discovered #vulnerability (CVE-2022-25636) in the Netfilter #firewall module of #Linux kernel could be exploited to gain root privileges on vulnerable systems, escape containers or cause a kernel panic.
https://github.com/Bonfee/CVE-2022-25636
https://github.com/Bonfee/CVE-2022-25636
GitHub
GitHub - Bonfee/CVE-2022-25636: CVE-2022-25636
CVE-2022-25636. Contribute to Bonfee/CVE-2022-25636 development by creating an account on GitHub.
RCE exploit for dompdf
https://positive.security/blog/dompdf-rce
https://github.com/positive-security/dompdf-rce
https://positive.security/blog/dompdf-rce
https://github.com/positive-security/dompdf-rce
positive.security
From XSS to RCE (dompdf 0day) | Positive Security
Using a still unpatched vulnerability in the PHP library dompdf (used for rendering PDFs from HTML), we achieved RCE on a web server with merely a reflected XSS vulnerability as entry point.
CVE-2022-0337 System environment variables leak on Google Chrome, Microsoft Edge and Opera
https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera
GitHub
GitHub - Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera: 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera…
🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337 - Puliczek/CVE-2022-0337-PoC-Google-Chrom...