hackspace
@hackspace
158
subscribers
279
photos
75
videos
23
files
998
links
hackspace
Download Telegram
Join
hackspace
158 subscribers
hackspace
https://github.com/bierschi/chromepass?s=35
GitHub
GitHub - bierschi/chromepass: Fetching passwords from the chrome browser database
Fetching passwords from the chrome browser database - GitHub - bierschi/chromepass: Fetching passwords from the chrome browser database
hackspace
https://malwaretech.com/2023/12/silly-edr-bypasses-and-where-to-find-them.html
Malwaretech
Silly EDR Bypasses and Where To Find Them
Abusing exception handlers to hook and bypass user mode EDR hooks.
hackspace
https://github.com/Az0x7/vulnerability-Checklist
GitHub
GitHub - Az0x7/vulnerability-Checklist: This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability…
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter - Az0x7/vulnerability-Checklist
hackspace
https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/?s=35
The Human Machine Interface
Creating a Rootkit to Learn C
Background Information This post is my solution for the last assignment in my Learning-C repository. I thought a good way to cap off a repo designed to introduce people to very basic C programming would be to take those very basic techinques and make a simple…
hackspace
https://github.com/nick0ve/how-to-bypass-aslr-on-linux-x86_64?s=35
GitHub
GitHub - nick0ve/how-to-bypass-aslr-on-linux-x86_64: ASLR bypass without infoleak
ASLR bypass without infoleak. Contribute to nick0ve/how-to-bypass-aslr-on-linux-x86_64 development by creating an account on GitHub.
hackspace
https://github.com/hackerhouse-opensource/marble?s=35
GitHub
GitHub - hackerhouse-opensource/Marble: The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation…
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools. - GitHub - hackerhouse-opensource/Marble: The CIA's Marble Framework...
hackspace
https://github.com/hackerhouse-opensource/Artillery?s=35
GitHub
GitHub - hackerhouse-opensource/Artillery: CIA UAC bypass implementation that utilizes elevated COM object to write to System32…
CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator. - GitHub - hackerhouse-opensource/Artillery: CIA UAC b...
hackspace
https://github.com/hackerhouse-opensource/SignToolEx?s=35
GitHub
GitHub - hackerhouse-opensource/SignToolEx: Patching "signtool.exe" to accept expired certificates for code-signing.
Patching "signtool.exe" to accept expired certificates for code-signing. - GitHub - hackerhouse-opensource/SignToolEx: Patching "signtool.exe" to accept expired ...
hackspace
https://github.com/Xacone/BestEdrOfTheMarket?s=35
GitHub
GitHub - Xacone/BestEdrOfTheMarket: EDR Lab for Experimentation Purposes
EDR Lab for Experimentation Purposes. Contribute to Xacone/BestEdrOfTheMarket development by creating an account on GitHub.
hackspace
Happy new year!
🎉
🥂
hackspace
https://github.com/reewardius/bbFuzzing.txt/tree/main?s=35
GitHub
GitHub - reewardius/bbFuzzing.txt
Contribute to reewardius/bbFuzzing.txt development by creating an account on GitHub.
hackspace
https://pentestlab.blog/2024/01/02/initial-access-search-ms-uri-handler/
Penetration Testing Lab
Initial Access – search-ms URI Handler
Microsoft search protocol enables clients to initiate connections against an enterprise search service such as SharePoint or WebDav. During these search connections the protocol server will respond…
hackspace
?
hackspace
https://cybersecuritynews.com/active-directory-checklist/
Cyber Security News
Active Directory Attack Kill Chain Checklist & Tools List- 2025
Here we are elaborating the tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise active directory and guidance
hackspace
https://medium.com/cyberscribers-exploring-cybersecurity/apt28-from-initial-damage-to-domain-controller-threats-in-an-hour-cert-ua-8399-1944dd6edcdf
Medium
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
hackspace
0:44
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
0:24
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
https://nltimes.nl/2024/01/08/dutch-man-sabotaged-iranian-nuclear-program-without-dutch-governments-knowledge-report
NL Times
Dutch man sabotaged Iranian nuclear program without Dutch government's knowledge: report
In 2008, a Dutchman played a crucial role in the United States and Israeli-led operation to sabotage Iran’s nuclear program. The then 36-year-old Erik van Sabben infiltrated an Iranian nuclear complex and released the infamous Stuxnet virus, paralyzing the…
hackspace
https://github.com/BC-SECURITY/Moriarty
GitHub
GitHub - BC-SECURITY/Moriarty: Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential…
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments. - GitHub - BC-SECURITY/Moriarty: Mor...
hackspace
https://github.com/dreadnode/parley?s=35
GitHub
GitHub - dreadnode/parley: Tree of Attacks (TAP) Jailbreaking Implementation
Tree of Attacks (TAP) Jailbreaking Implementation. Contribute to dreadnode/parley development by creating an account on GitHub.
hackspace
https://github.com/eeriedusk/nysm?s=35
GitHub
GitHub - eeriedusk/nysm: nysm is a stealth post-exploitation container.
nysm is a stealth post-exploitation container. Contribute to eeriedusk/nysm development by creating an account on GitHub.
TWeb.init({scrollToPost:'hackspace/1115'});