Peneter Tools – Telegram
Forwarded from Peneter.com
مطمئن شین که Outlook شما وصله شده!

هکرها می‌تونن از راه دور، رمزهای ورود به سیستم ویندوز 🔑 NTLM شما رو سرقت کنن

آسیب پذیری CVE-2023-35636 در قابلیت تقویم Outlook وجود داره که از طریق دعوت‌نامه هایی که به‌طور خاص ساخته شده‌ن، راه‌اندازی می‌شه

جزئیات در اینجا: https://thehackernews.com/2024/01/researchers-uncover-outlook.html

#امنیت_سایبری #هک #آسیب_پذیری
#cybersecurity #hacking #vulnerability
Forwarded from Peneter.com
🔍 موتورهای جستجو برای پن‌تسترها

🔍 Search Engine for Pentesters

#searchengine #pentester #cyber #hacking #cybersecurity
Disable Windows Defender (+ UAC Bypass, + Upgrade to SYSTEM)
https://github.com/EvilGreys/Disable-Windows-Defender-
NTLM Relay Gat - streamlines the process of exploiting NTLM relay vulnerabilities, offering a range of functionalities from listing SMB shares to executing commands on MSSQL databases.
https://github.com/ad0nis/ntlm_relay_gat
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
https://github.com/reveng007/DarkWidow
With PPLDescribe, you can retrieve information about processes that are protected by PPL. The tool parses PS_PROTECTION, PS_PROTECTED_TYPE and PS_PROTECTED_SIGNER structures to retrieve the information
#Credential_access
https://github.com/MzHmO/PPLDescribe