Sec Note – Telegram
Sec Note
1.39K subscribers
83 photos
5 videos
31 files
155 links
Download Telegram
Bypassing Enrollment Restrictions to Break BYOD Barriers in Intune (bring your own device)
Ways of device ownership spoofing and more for persistent access to Intune


This byod is not that byod😅
👾9
Forwarded from Order of Six Angles
👾1
👾3
Forwarded from 1N73LL1G3NC3
OWA Pentest Guide

В статье разобраны все основные атаки и уязвимости OWA и MS Exchange:
• OSINT
• Password spraying
• GAL/OAB
• Архитектура работы
• ZDI-CAN-22101
• OWA CAP Bypass
• CVE-2020-0688
• ProxyLogon
• CVE-2021-26855 - Pre-auth SSRF
• CVE-2021-27065 - Post-auth Arbitrary-File-Write
• ProxyOracle
• CVE-2021-31196 - The Padding Oracle
• CVE-2021-31195 - XSS
• Обход HttpOnly
• ProxyShell
• CVE-2021-34473 - Pre-auth Path Confusion leads to ACL Bypass
• CVE-2021-34523 - Exchange PowerShell Backend Elevation-of-Privilege
• CVE-2021-31207 - Post-auth Arbitrary-File-Write
• ProxyNotShell
• ProxyRelay
• Relay атаки


Thx: @pentestnotes
👾6
👾5
👾8
I've just realized that it was actually normal.😂😂😂
👾10
2024-05-02 - Dissecting LOCKBIT v3 ransomware.pdf
2 MB
👾5
👾4
2025-07-22 - Black Mass Volume III.pdf
3.1 MB
👾7
👾4
Breaking Control Flow Flattening: A Deep Technical Analysis

https://zerotistic.blog/posts/cff-remover/



advanced obfuscation with LLVM and template metaprogramming
https://0xpat.github.io/Malware_development_part_6/


basic Ultility To Generate C++ Codes That Applies Some Sort Of Control Flow Flattening Obfuscation On Your Projects.
https://github.com/PaulNorman01/Control-Flow-Flattening-Ultility

Building a Compile-Time Obfuscation Tool
https://medium.com/@bu19akov/building-a-compile-time-obfuscation-tool-c757effe19b5


Angr Control Flow Deobfuscation
https://research.openanalysis.net/angr/symbolic%20execution/deobfuscation/research/2022/03/26/angr_notes.html
1👾7
I wannabe Red Team Operator, so what Now?

Tools won’t make you a Red Teamer any more than a stethoscope makes you a doctor. What matters is knowing why, when, and how to use them. Surgically.
👾10
Meet the Malware: Extension
TigerJack's Extensions Continue to Rob Developers Blind Across Different Marketplaces


#stealer
👾2