Inception Framework - Provides In-memory compilation and reflective loading of C# apps for AV evasion
https://ift.tt/2BnuCrn
Submitted August 22, 2018 at 01:00PM by PeterG45
via reddit https://ift.tt/2Mq4Wzs
https://ift.tt/2BnuCrn
Submitted August 22, 2018 at 01:00PM by PeterG45
via reddit https://ift.tt/2Mq4Wzs
GitHub
two06/Inception
Inception - Provides In-memory compilation and reflective loading of C# apps for AV evasion.
Ghostnoscript Remote Execution Bug
https://ift.tt/2LdOtJ5
Submitted August 22, 2018 at 11:51AM by le-quack
via reddit https://ift.tt/2N8jIHl
https://ift.tt/2LdOtJ5
Submitted August 22, 2018 at 11:51AM by le-quack
via reddit https://ift.tt/2N8jIHl
seclists.org
oss-sec: More Ghostnoscript Issues: Should we disable PS coders in policy.xml by default?
In-memory powershell reverse SSH+proxy noscript
https://ift.tt/2LhljIY
Submitted August 22, 2018 at 08:02PM by fridgehead
via reddit https://ift.tt/2w1Ww6O
https://ift.tt/2LhljIY
Submitted August 22, 2018 at 08:02PM by fridgehead
via reddit https://ift.tt/2w1Ww6O
GitHub
fridgehead/Powershell-SSHTools
Powershell-SSHTools - A bunch of useful SSH tools for powershell
Targeted ransomware dubbed Ryuk is hitting organizations worldwide, appears related to previous North Korean malware Hermes
https://ift.tt/2Mq3FIv
Submitted August 22, 2018 at 07:54PM by _marklech_
via reddit https://ift.tt/2LiSAmZ
https://ift.tt/2Mq3FIv
Submitted August 22, 2018 at 07:54PM by _marklech_
via reddit https://ift.tt/2LiSAmZ
Check Point Research
Ryuk Ransomware: A Targeted Campaign Break-Down - Check Point Research
Over the past two weeks, Ryuk, a targeted and well-planned Ransomware, has attacked various organizations worldwide. So far the campaign has targeted several enterprises, while encrypting hundreds of PC, storage and data centers in each infected company.…
Lessons Learned Deploying a Generic CSRF Solution
https://ift.tt/2Pxaczd
Submitted August 22, 2018 at 08:40PM by jrozner
via reddit https://ift.tt/2MGFi8K
https://ift.tt/2Pxaczd
Submitted August 22, 2018 at 08:40PM by jrozner
via reddit https://ift.tt/2MGFi8K
Medium
Lessons Learned Deploying a Generic CSRF Solution
The summer of 2017 culminated the substantial research and development effort of a generic solution to CSRF that could be easily applied…
CVE-2018–4991: Adobe Creative Cloud Desktop Local Privilege Escalation via Signature Bypass”
https://ift.tt/2wqDczV
Submitted August 22, 2018 at 09:23PM by CodeColorist
via reddit https://ift.tt/2PstvJE
https://ift.tt/2wqDczV
Submitted August 22, 2018 at 09:23PM by CodeColorist
via reddit https://ift.tt/2PstvJE
Medium
CVE-2018–4991: Adobe Creative Cloud Desktop Local Privilege Escalation via Signature Bypass
The patch was issued in APSB18–12:
CVE-2018–8412: MS Office 2016 for Mac Privilege Escalation via a Legacy Package
https://ift.tt/2Pt5iTD
Submitted August 22, 2018 at 09:51PM by CodeColorist
via reddit https://ift.tt/2OY7gKO
https://ift.tt/2Pt5iTD
Submitted August 22, 2018 at 09:51PM by CodeColorist
via reddit https://ift.tt/2OY7gKO
Medium
CVE-2018–8412: MS Office 2016 for Mac Privilege Escalation via a Legacy Package
The patch has been released, please upgrade your MAU to 18081201
CVE-2018-11776: How to find 5 RCEs in Apache Struts with Semmle QL
https://ift.tt/2PwHNZN
Submitted August 22, 2018 at 10:31PM by sheepfiend
via reddit https://ift.tt/2BBf96Z
https://ift.tt/2PwHNZN
Submitted August 22, 2018 at 10:31PM by sheepfiend
via reddit https://ift.tt/2BBf96Z
Lgtm
CVE-2018-11776: How to find 5 RCEs in Apache Struts with Semmle QL
Semmle security researcher Man Yue Mo explains how he used Semmle QL's Data Flow library to discover multiple RCE vulnerabilities (CVE-2018-11776) in Apache Struts.
vulnerability affects all openssh versions released in the past twodecades
https://ift.tt/2BCSgQE
Submitted August 22, 2018 at 11:41PM by sai_ismyname
via reddit https://ift.tt/2NcCzRH
https://ift.tt/2BCSgQE
Submitted August 22, 2018 at 11:41PM by sai_ismyname
via reddit https://ift.tt/2NcCzRH
BleepingComputer
Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades
A vulnerability affects all versions of the OpenSSH client released in the past two decades, ever since the application was released in 1999.
BYOB (Build Your Own Botnet)
https://ift.tt/2o2lJKj
Submitted August 23, 2018 at 08:16AM by poop_shit_POOP
via reddit https://ift.tt/2Bz8Gt6
https://ift.tt/2o2lJKj
Submitted August 23, 2018 at 08:16AM by poop_shit_POOP
via reddit https://ift.tt/2Bz8Gt6
GitHub
GitHub - malwaredllc/byob: An open-source post-exploitation framework for students, researchers and developers.
An open-source post-exploitation framework for students, researchers and developers. - GitHub - malwaredllc/byob: An open-source post-exploitation framework for students, researchers and developers.
Security Concerns Surrounding WebAuthn: Don't Implement ECDAA (Yet)
https://ift.tt/2nZmvro
Submitted August 23, 2018 at 01:11PM by sarciszewski
via reddit https://ift.tt/2BLHBmW
https://ift.tt/2nZmvro
Submitted August 23, 2018 at 01:11PM by sarciszewski
via reddit https://ift.tt/2BLHBmW
Paragonie
Security Concerns Surrounding WebAuthn: Don't Implement ECDAA (Yet) - Paragon Initiative Enterprises Blog
If you're planning on implementing the W3C and FIDO Alliance's new WebAuthn standard for hardware security token support, skip ECDAA for now.
Scrounger - Mobile application penetration testing framework
https://ift.tt/2MuBaJB
Submitted August 23, 2018 at 05:18PM by eth_
via reddit https://ift.tt/2BEN3b7
https://ift.tt/2MuBaJB
Submitted August 23, 2018 at 05:18PM by eth_
via reddit https://ift.tt/2BEN3b7
Nettitude Labs
Introducing Scrounger – iOS and Android mobile application penetration testing framework
Scrounger is a modular tool designed to perform the routine tasks required during a mobile application security assessment. Scrounger conveniently brings together both major mobile operating syste…
Distorted and Undeletable Posts in Facebook Group – InfoSec Write-ups – Medium
https://ift.tt/2MsuxYy
Submitted August 23, 2018 at 08:04PM by Eta-Meson
via reddit https://ift.tt/2P4JYD9
https://ift.tt/2MsuxYy
Submitted August 23, 2018 at 08:04PM by Eta-Meson
via reddit https://ift.tt/2P4JYD9
Medium
Distorted and Undeletable Posts in Facebook Group
Sup guys, Today I would like to share with you an interesting bug that I found in facebook group through their BugBounty program, so let’s…
Burp Suite 2.0 beta now available
https://ift.tt/2o50OpS
Submitted August 23, 2018 at 07:52PM by IamJacksLackOf
via reddit https://ift.tt/2BFhDBr
https://ift.tt/2o50OpS
Submitted August 23, 2018 at 07:52PM by IamJacksLackOf
via reddit https://ift.tt/2BFhDBr
Web Security Blog | PortSwigger
Burp Suite 2.0 beta now available
Burp Suite 2.0 beta is now available to Professional users. This is a major upgrade, with a host of new features, including: A new crawler, able to automatically handle sessions, detect changes in app
DNS Rebinding Headless Browsers: Breaching the perimeter and attacking cloud environments
https://ift.tt/2oaIZpz
Submitted August 23, 2018 at 08:51PM by alexksak
via reddit https://ift.tt/2w7cD3c
https://ift.tt/2oaIZpz
Submitted August 23, 2018 at 08:51PM by alexksak
via reddit https://ift.tt/2w7cD3c
reddit
r/netsec - DNS Rebinding Headless Browsers: Breaching the perimeter and attacking cloud environments
1 vote and 0 comments so far on Reddit
The importance of being noisy [LWN.net]
https://ift.tt/2wtLebh
Submitted August 24, 2018 at 01:29AM by skeeto
via reddit https://ift.tt/2BHVbYq
https://ift.tt/2wtLebh
Submitted August 24, 2018 at 01:29AM by skeeto
via reddit https://ift.tt/2BHVbYq
lwn.net
The importance of being noisy
Hundreds (at least) of kernel bugs are fixed every month. Given the
kernel's privileged position within the system, a relatively large portion
of those bugs have security implications. Many bugs are relatively easily
noticed once they are triggered; that…
kernel's privileged position within the system, a relatively large portion
of those bugs have security implications. Many bugs are relatively easily
noticed once they are triggered; that…
CVE-2018-15685 - Electron WebPreferences RCE (yet another nodeIntegration bypass bug)
https://ift.tt/2BJkI3d
Submitted August 24, 2018 at 10:49PM by nibblesec
via reddit https://ift.tt/2Muknq4
https://ift.tt/2BJkI3d
Submitted August 24, 2018 at 10:49PM by nibblesec
via reddit https://ift.tt/2Muknq4
GitHub
matt-/CVE-2018-15685
POC for CVE-2018-15685
Learn about the Struts2 Remote Code Execution vulnerability CVE-2018-11776, how to exploit and how to create a Proof of Concept (POC) with docker.
https://ift.tt/2BK09DL
Submitted August 25, 2018 at 03:11AM by secjuice
via reddit https://ift.tt/2PCCckS
https://ift.tt/2BK09DL
Submitted August 25, 2018 at 03:11AM by secjuice
via reddit https://ift.tt/2PCCckS
Secjuice.com
Apache Struts2 CVE-2018-11776
Learn about the Struts2 Remote Code Execution vulnerability CVE-2018-11776, how to exploit and how to create a Proof of Concept (POC) with docker.
Fortnite Installer downloads are vulnerable to hijacking
https://ift.tt/2PBk1Mg
Submitted August 25, 2018 at 06:49AM by monarchmra
via reddit https://ift.tt/2Nc96qO
https://ift.tt/2PBk1Mg
Submitted August 25, 2018 at 06:49AM by monarchmra
via reddit https://ift.tt/2Nc96qO
reddit
r/netsec - Fortnite Installer downloads are vulnerable to hijacking
0 votes and 1 comment so far on Reddit
Replaying Trickbot's C&C traffic with imaginary C2
https://ift.tt/2LueELA
Submitted August 25, 2018 at 08:10PM by _toti
via reddit https://ift.tt/2Ni3viR
https://ift.tt/2LueELA
Submitted August 25, 2018 at 08:10PM by _toti
via reddit https://ift.tt/2Ni3viR
GitHub
felixweyne/imaginaryC2
imaginaryC2 - Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively cho...
Vba2Graph - Generate call graphs from VBA code for easier analysis of malicious documents
https://ift.tt/2wd9sHg
Submitted August 26, 2018 at 01:24AM by TechLord2
via reddit https://ift.tt/2My82S1
https://ift.tt/2wd9sHg
Submitted August 26, 2018 at 01:24AM by TechLord2
via reddit https://ift.tt/2My82S1
GitHub
MalwareCantFly/Vba2Graph
Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.