hackspace
@hackspace
158
subscribers
279
photos
75
videos
23
files
998
links
hackspace
Download Telegram
Join
hackspace
158 subscribers
hackspace
https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html
Vin01’s Blog
SSH ProxyCommand == unexpected code execution (CVE-2023-51385)
Summary
hackspace
0:12
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
SEC Consult
SMTP Smuggling - Spoofing E-Mails Worldwide
Introducing a novel technique for e-mail spoofing
hackspace
https://github.com/bierschi/chromepass?s=35
GitHub
GitHub - bierschi/chromepass: Fetching passwords from the chrome browser database
Fetching passwords from the chrome browser database - GitHub - bierschi/chromepass: Fetching passwords from the chrome browser database
hackspace
https://malwaretech.com/2023/12/silly-edr-bypasses-and-where-to-find-them.html
Malwaretech
Silly EDR Bypasses and Where To Find Them
Abusing exception handlers to hook and bypass user mode EDR hooks.
hackspace
https://github.com/Az0x7/vulnerability-Checklist
GitHub
GitHub - Az0x7/vulnerability-Checklist: This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability…
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter - Az0x7/vulnerability-Checklist
hackspace
https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/?s=35
The Human Machine Interface
Creating a Rootkit to Learn C
Background Information This post is my solution for the last assignment in my Learning-C repository. I thought a good way to cap off a repo designed to introduce people to very basic C programming would be to take those very basic techinques and make a simple…
hackspace
https://github.com/nick0ve/how-to-bypass-aslr-on-linux-x86_64?s=35
GitHub
GitHub - nick0ve/how-to-bypass-aslr-on-linux-x86_64: ASLR bypass without infoleak
ASLR bypass without infoleak. Contribute to nick0ve/how-to-bypass-aslr-on-linux-x86_64 development by creating an account on GitHub.
hackspace
https://github.com/hackerhouse-opensource/marble?s=35
GitHub
GitHub - hackerhouse-opensource/Marble: The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation…
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools. - GitHub - hackerhouse-opensource/Marble: The CIA's Marble Framework...
hackspace
https://github.com/hackerhouse-opensource/Artillery?s=35
GitHub
GitHub - hackerhouse-opensource/Artillery: CIA UAC bypass implementation that utilizes elevated COM object to write to System32…
CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator. - GitHub - hackerhouse-opensource/Artillery: CIA UAC b...
hackspace
https://github.com/hackerhouse-opensource/SignToolEx?s=35
GitHub
GitHub - hackerhouse-opensource/SignToolEx: Patching "signtool.exe" to accept expired certificates for code-signing.
Patching "signtool.exe" to accept expired certificates for code-signing. - GitHub - hackerhouse-opensource/SignToolEx: Patching "signtool.exe" to accept expired ...
hackspace
https://github.com/Xacone/BestEdrOfTheMarket?s=35
GitHub
GitHub - Xacone/BestEdrOfTheMarket: EDR Lab for Experimentation Purposes
EDR Lab for Experimentation Purposes. Contribute to Xacone/BestEdrOfTheMarket development by creating an account on GitHub.
hackspace
Happy new year!
🎉
🥂
hackspace
https://github.com/reewardius/bbFuzzing.txt/tree/main?s=35
GitHub
GitHub - reewardius/bbFuzzing.txt
Contribute to reewardius/bbFuzzing.txt development by creating an account on GitHub.
hackspace
https://pentestlab.blog/2024/01/02/initial-access-search-ms-uri-handler/
Penetration Testing Lab
Initial Access – search-ms URI Handler
Microsoft search protocol enables clients to initiate connections against an enterprise search service such as SharePoint or WebDav. During these search connections the protocol server will respond…
hackspace
?
hackspace
https://cybersecuritynews.com/active-directory-checklist/
Cyber Security News
Active Directory Attack Kill Chain Checklist & Tools List- 2025
Here we are elaborating the tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise active directory and guidance
hackspace
https://medium.com/cyberscribers-exploring-cybersecurity/apt28-from-initial-damage-to-domain-controller-threats-in-an-hour-cert-ua-8399-1944dd6edcdf
Medium
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
hackspace
0:44
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
0:24
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
https://nltimes.nl/2024/01/08/dutch-man-sabotaged-iranian-nuclear-program-without-dutch-governments-knowledge-report
NL Times
Dutch man sabotaged Iranian nuclear program without Dutch government's knowledge: report
In 2008, a Dutchman played a crucial role in the United States and Israeli-led operation to sabotage Iran’s nuclear program. The then 36-year-old Erik van Sabben infiltrated an Iranian nuclear complex and released the infamous Stuxnet virus, paralyzing the…
TWeb.init({scrollToPost:'hackspace/1112'});