hackspace
@hackspace
158
subscribers
279
photos
75
videos
23
files
998
links
hackspace
Download Telegram
Join
hackspace
158 subscribers
hackspace
https://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/
The DFIR Report
IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment
Key Takeaways In October 2023, we observed an intrusion that began with a spam campaign, distributing a forked IcedID loader. The threat actor used Impacket’s wmiexec and RDP to install Scree…
hackspace
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/back-to-the-hype-an-update-on-how-cybercriminals-are-using-genai
Trendmicro
Back to the Hype: An Update on How Cybercriminals Are Using GenAI
Generative AI continues to be misused and abused by malicious individuals. In this article, we dive into new criminal LLMs, criminal services with ChatGPT-like capabilities, and deepfakes being offered on criminal sites.
hackspace
hackspace
https://github.com/roboflow/supervision
GitHub
GitHub - roboflow/supervision: We write your reusable computer vision tools.
💜
We write your reusable computer vision tools.
💜
. Contribute to roboflow/supervision development by creating an account on GitHub.
hackspace
https://youtu.be/aq9-nU1AH0Q?si=ZlboE6mVkVdrxbiw
YouTube
Abusing ADCS - Active Directory Trust Attack
#ADCS #activedirectory #hacking #windows
By creating a vulnerable Certificate Template, we modify the Configuration Naming Context (NC) in Active Directory. NC holds configuration information about the entire forest, including ADCS details. We then push…
hackspace
https://github.com/vxCrypt0r/Voidgate?s=35
GitHub
GitHub - vxCrypt0r/Voidgate: A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known…
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encry...
hackspace
https://blog.eclecticiq.com/onnx-store-targeting-financial-institution?s=35
Eclecticiq
ONNX Store: Phishing-as-a-Service Platform Targeting Financial Institution
EclecticIQ analysts discovered phishing campaigns targeting financial institutions driven by a Phishing-as-a-Service (PhaaS) platform called ONNX Store.
hackspace
https://github.com/erebe/wstunnel?s=35
GitHub
GitHub - erebe/wstunnel: Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available - GitHub - erebe/wstunnel: Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI -...
hackspace
https://github.com/SafeBreach-Labs/MagicDot?s=35
GitHub
GitHub - SafeBreach-Labs/MagicDot: A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT…
A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue - SafeBreach-Labs/MagicDot
hackspace
0:11
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/?s=35
The Human Machine Interface
Creating a Rootkit to Learn C
Background Information This post is my solution for the last assignment in my Learning-C repository. I thought a good way to cap off a repo designed to introduce people to very basic C programming would be to take those very basic techinques and make a simple…
hackspace
https://blog.blacklanternsecurity.com/p/introducing-baddns?s=35
Blacklanternsecurity
Introducing BadDNS
Black Lantern Security is publicly releasing our new Python DNS auditing tool, BadDNS. It’s primarily a subdomain takeover detection tool but covers other DNS related issues like zone transfers and NSEC walking as well. Thanks for reading Black Lantern Security…
hackspace
hackspace
https://www.bleepingcomputer.com/news/security/new-specula-tool-uses-outlook-for-remote-code-execution-in-windows/?s=35
BleepingComputer
New Specula tool uses Outlook for remote code execution in Windows
Microsoft Outlook can be turned into a C2 beacon to remotely execute code, as demonstrated by a new red team post-exploitation framework named "Specula," released today by cybersecurity firm TrustedSec.
hackspace
https://github.com/arphanetx/Monocle
GitHub
GitHub - arphanetx/Monocle: Tooling backed by an LLM for performing natural language searches against compiled target binaries.…
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password strings, vulnerabilities, etc. - GitHub - arphanetx/Monocle...
hackspace
0:21
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
https://github.com/Chocapikk/CVE-2024-36401
GitHub
GitHub - Chocapikk/CVE-2024-36401: GeoServer Remote Code Execution
GeoServer Remote Code Execution. Contribute to Chocapikk/CVE-2024-36401 development by creating an account on GitHub.
hackspace
https://github.com/lypd0/DeadPotato
GitHub
GitHub - lypd0/DeadPotato: DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging…
DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This noscript has been customized from ...
hackspace
https://github.com/zyn3rgy/smbtakeover
GitHub
GitHub - zyn3rgy/smbtakeover: BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions
BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions - GitHub - zyn3rgy/smbtakeover: BOF and Python3 implementation of technique to unbind 445/tcp on Windo...
hackspace
https://github.com/wikiZ/RedGuard
GitHub
GitHub - wikiZ/RedGuard: RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.
RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check. - wikiZ/RedGuard
hackspace
https://posts.specterops.io/mythic-3-3-beta-rise-of-the-events-6aeb84aa6fed
SpecterOps
Mythic 3.3 Beta: Rise of the Events - SpecterOps
Check out Mythic 3.3's major updates, including command augmentation and auto triage tracking. Get ready to optimize your workflows with the new features!
TWeb.init({scrollToPost:'hackspace/1256'});