Peneter Tools – Telegram
PowerView.py is an alternative for the awesome original PowerView.ps1 noscript. Most of the modules used in PowerView are available in this project ( some of the flags are changed ).

Interesting Features

Embedded user session

Mini PowerView.py console to make you feel at home when using PowerView in Powershell

Auto-completer, so no more memorizing commands

Cross-Domain interactions

https://github.com/aniqfakhrul/powerview.py

#powerview
LPE exploit for CVE-2022-34918. This exploit has been written for the kernel Linux ubuntu 5.15.0-39-generic

Blog:

https://www.randorisec.fr/crack-linux-firewall/

POC:

https://github.com/randorisec/CVE-2022-34918-LPE-PoC

#Linux #LPE
Mandiant Azure Workshop For Redteaming and detection
Requirements
Azure tenant
Azure CLI
Terafform version 1.2.2 or above
Azure User with Global Admin role in the AAD tenant
add your external IP on lines 248-249 in kc1.tf

https://lnkd.in/g752YaTa
#Azure #redteam
Detectree is a data visualisation tool for blue teams. It provides a graphical representation of detection data, which allows an analyst to generate almost instant opinions about the nature of the underlying activity and to understand complex relationships between the data points. Ultimately, this can help reduce response time, reduce alert fatigue and facilitate communication between analysts within the teams.
https://lnkd.in/dE5b-P62
Reading an arbitrary ThinkPHP 5.X file

Nuclei Template :https://github.com/momika233/TP5_Arbitrary_file_read/blob/main/TP5_Arbitrary_file_read.yaml


PoCs: {{BaseURL}}/?s=index/think\\Error/appError&errno=1&errstr=1&errline=1&errfile=../../../etc/passwd


Dork for Shodan: "X-Powered By: ThinkPHP"
A standalone noscript that adds information about unpatched vulnerabilities to BloodHound based on parsed vulnerability scanners reports. Security teams can then use this data to define starting points for paths (e.g. paths to Domain Admins from vulnerable hosts) or write queries that consider lateral movement to vulnerable hosts.

Supported Scanners

Tenable Nessus

Qualys

Greenbone OpenVAS

Nmap Vuln NSE Script


https://github.com/zeronetworks/BloodHound-Tools/tree/main/VulnerabilitiesDataImport
Apache Spark Shell Command Injection CVE-2022-33891

The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. An authentication filter checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.

https://github.com/AmoloHT/CVE-2022-33891

#Apache #spark
wget-root :

If the wget binary has the SUID bit set, It does not drop the elevated privileges and may be abused to access the file system. It may be used to do privileged writes or write files outside a restricted file system. This noscript automates the rewriting of the passwd file of the victim's machine.

https://github.com/CopernicusPY/wget-root
PersistAssist is a fully modular persistence framework written in C#. All persistence techniques contain a cleanup method which will server to remove the persistence aside from the persistence code. This is a WIP so there are many empty classes, the main object of this project initially was to build out a fully modular framework meant to make adding new features as simple as inheriting a class and adding the code.
https://github.com/FortyNorthSecurity/PersistAssist