Apache Tomcat Vulnerability Scanner:
https://github.com/p0dalirius/ApacheTomcatScanner
https://github.com/p0dalirius/ApacheTomcatScanner
GitHub
GitHub - p0dalirius/ApacheTomcatScanner: A python noscript to scan for Apache Tomcat server vulnerabilities.
A python noscript to scan for Apache Tomcat server vulnerabilities. - GitHub - p0dalirius/ApacheTomcatScanner: A python noscript to scan for Apache Tomcat server vulnerabilities.
Powershell noscript that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.
https://github.com/last-byte/PersistenceSniper/
https://github.com/last-byte/PersistenceSniper/
GitHub
GitHub - last-byte/PersistenceSniper: Powershell module that can be used by Blue Teams, Incident Responders and System Administrators…
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w...
Certipy 4.0: ESC9 & ESC10, BloodHound GUI, New Authentication and Request Methods — and more!
https://research.ifcr.dk/certipy-4-0-esc9-esc10-bloodhound-gui-new-authentication-and-request-methods-and-more-7237d88061f7
https://github.com/ly4k/Certipy
https://research.ifcr.dk/certipy-4-0-esc9-esc10-bloodhound-gui-new-authentication-and-request-methods-and-more-7237d88061f7
https://github.com/ly4k/Certipy
Medium
Certipy 4.0: ESC9 & ESC10, BloodHound GUI, New Authentication and Request Methods — and more!
A new version of Certipy has been released along with a forked BloodHound GUI that has PKI support! In this blog post, we will look at…
This noscript allows to find MySQLi vulnerabilities Based on Errors with nuclei
https://github.com/HernanRodriguez1/ScanMySQLiErrorBased-Nuclei
https://github.com/HernanRodriguez1/ScanMySQLiErrorBased-Nuclei
GitHub
GitHub - HernanRodriguez1/ScanMySQLiErrorBased-Nuclei
Contribute to HernanRodriguez1/ScanMySQLiErrorBased-Nuclei development by creating an account on GitHub.
PersistAssist is a fully modular persistence framework written in C#. All persistence techniques contain a cleanup method which will server to remove the persistence aside from the persistence code. This is a WIP so there are many empty classes, the main object of this project initially was to build out a fully modular framework meant to make adding new features as simple as inheriting a class and adding the code.
https://github.com/FortyNorthSecurity/PersistAssist
https://github.com/FortyNorthSecurity/PersistAssist
GitHub
GitHub - RedSiege/PersistAssist: Fully modular persistence framework
Fully modular persistence framework. Contribute to RedSiege/PersistAssist development by creating an account on GitHub.
A Python noscript to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997
for mitigation Update to Webmin >= 1.997
https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE
#webmin #rce
for mitigation Update to Webmin >= 1.997
https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE
#webmin #rce
GitHub
GitHub - p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE: A Python noscript to exploit CVE-2022-36446 Software Package…
A Python noscript to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997. - p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE
An automatic unpacker and logger for DotNet Framework targeting files! This tool has been unveiled at Black Hat USA 2022.
https://github.com/advanced-threat-research/DotDumper
#unpacker #DotNet
https://github.com/advanced-threat-research/DotDumper
#unpacker #DotNet
GitHub
GitHub - advanced-threat-research/DotDumper: An automatic unpacker and logger for DotNet Framework targeting files
An automatic unpacker and logger for DotNet Framework targeting files - advanced-threat-research/DotDumper
This repository contains de materials for the talk "Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek’s SDK for eCos OS.", which was presented at DEFCON30.
https://github.com/infobyte/cve-2022-27255
#Realtek #eCos
https://github.com/infobyte/cve-2022-27255
#Realtek #eCos
GitHub
GitHub - infobyte/cve-2022-27255
Contribute to infobyte/cve-2022-27255 development by creating an account on GitHub.
Sandman is a NTP based backdoor for red team engagements in hardened networks.
https://github.com/Idov31/Sandman
#NTP #backdoor
https://github.com/Idov31/Sandman
#NTP #backdoor
GitHub
GitHub - Idov31/Sandman: Sandman is a NTP based backdoor for hardened networks.
Sandman is a NTP based backdoor for hardened networks. - Idov31/Sandman
TOP All bugbounty pentesting CVE-2022- POC Exp RCE example payload Things
https://github.com/hktalent/TOP
#bugbounty
https://github.com/hktalent/TOP
#bugbounty
GitHub
GitHub - GhostTroops/TOP: TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things
TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things - GhostTroops/TOP
Security researchers discovered 3 vulnerabilities in the Linux kernel that could allow a local attacker to elevate privileges and potentially execute malicious code. The proof-of-concept code is publicly available increasing the likelihood of exploitation in the wild.
https://github.com/greek0x0/2022-LPE-UAF
https://zplin.me/papers/DirtyCred-Zhenpeng.pdf
#LPE
https://github.com/greek0x0/2022-LPE-UAF
https://zplin.me/papers/DirtyCred-Zhenpeng.pdf
#LPE
GitHub
GitHub - greek0x0/2022-LPE-UAF: PoC of various bugs in the Linux kernel
PoC of various bugs in the Linux kernel. Contribute to greek0x0/2022-LPE-UAF development by creating an account on GitHub.
The sources of the Linux kernel exploitation technique called DirtyCred are now on GitHub. The attack, which was presented at Black Hat 2022 security conference, is a kernel exploitation concept that swaps unprivileged kernel credentials with privileged ones to escalate privileges without overwriting any critical data on the kernel heap.
https://github.com/Markakd/DirtyCred
#LPE
https://github.com/Markakd/DirtyCred
#LPE
GitHub
GitHub - Markakd/DirtyCred: Kernel exploitation technique
Kernel exploitation technique. Contribute to Markakd/DirtyCred development by creating an account on GitHub.