eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html
GitHub - DarkCoderSc/PowerRemoteDesktop: Remote Desktop entirely coded in PowerShell.
https://github.com/DarkCoderSc/PowerRemoteDesktop
https://github.com/DarkCoderSc/PowerRemoteDesktop
GitHub
GitHub - PhrozenIO/PowerRemoteDesktop: Remote Desktop entirely coded in PowerShell.
Remote Desktop entirely coded in PowerShell. Contribute to PhrozenIO/PowerRemoteDesktop development by creating an account on GitHub.
GitHub - boku7/BokuLoader: Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities. By: @0xBoku & @s4ntiago_p
https://github.com/boku7/BokuLoader
https://github.com/boku7/BokuLoader
GitHub
GitHub - boku7/BokuLoader: A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt…
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader
Attacking Active Directory: 0 to 0.9 | zer1t0
https://zer1t0.gitlab.io/posts/attacking_ad/
https://zer1t0.gitlab.io/posts/attacking_ad/
Linux privilege escalation exploit:
$ alias whoami='echo root'
$ export PS1='# '
# whoami
root
😎
$ alias whoami='echo root'
$ export PS1='# '
# whoami
root
😎
Playing With Cobalt Strike | Sid's Blog
https://swlacy.com/posts/playing-with-cobalt-strike
https://swlacy.com/posts/playing-with-cobalt-strike
Sid's Blog
Playing With Cobalt Strike
Fun with Cobalt Strike v4.5
GitHub - mkellerman/Invoke-CommandAs: Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects.
https://github.com/mkellerman/Invoke-CommandAs
https://github.com/mkellerman/Invoke-CommandAs
GitHub
GitHub - mkellerman/Invoke-CommandAs: Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects.
Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects. - mkellerman/Invoke-CommandAs
Fuzzing IoT binaries with AFL++ - Part I
https://blog.attify.com/fuzzing-iot-devices-part-1/
https://blog.attify.com/fuzzing-iot-devices-part-1/
Attify Blog - IoT Security, Pentesting and Exploitation
Fuzzing IoT binaries with AFL++ - Part I
Fuzzing closed source IoT firmware binaries with AFL++ in Qemu mode. Fuzzing networked apps often requires desocketing and patching the binary.
GitHub - icyguider/Nimcrypt2: .NET, PE, & Raw Shellcode Packer/Loader Written in Nim
https://github.com/icyguider/Nimcrypt2
https://github.com/icyguider/Nimcrypt2
GitHub
GitHub - icyguider/Nimcrypt2: .NET, PE, & Raw Shellcode Packer/Loader Written in Nim
.NET, PE, & Raw Shellcode Packer/Loader Written in Nim - icyguider/Nimcrypt2
GitHub - kleiton0x00/Advanced-SQL-Injection-Cheatsheet: A cheat sheet that contains advanced queries for SQL Injection of all types.
https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet
https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet
GitHub
GitHub - kleiton0x00/Advanced-SQL-Injection-Cheatsheet: A cheat sheet that contains advanced queries for SQL Injection of all types.
A cheat sheet that contains advanced queries for SQL Injection of all types. - kleiton0x00/Advanced-SQL-Injection-Cheatsheet
Release ConPtyShell 1.5 · antonioCoco/ConPtyShell · GitHub
https://github.com/antonioCoco/ConPtyShell/releases/tag/1.5
https://github.com/antonioCoco/ConPtyShell/releases/tag/1.5
GitHub
Release ConPtyShell 1.5 · antonioCoco/ConPtyShell
Changes
Huge change in the "Upgrade" function in order to support also the hijacking of Non-Overlapped sockets. 🎉
This is implemented by setting the socket in non-blocking mode through t...
Huge change in the "Upgrade" function in order to support also the hijacking of Non-Overlapped sockets. 🎉
This is implemented by setting the socket in non-blocking mode through t...
GitHub - microsoft/routeros-scanner: Tool to scan for RouterOS (Mikrotik) forensic artifacts and vulnerabilities.
https://github.com/microsoft/routeros-scanner
https://github.com/microsoft/routeros-scanner
GitHub
GitHub - microsoft/routeros-scanner: Tool to scan for RouterOS (Mikrotik) forensic artifacts and vulnerabilities.
Tool to scan for RouterOS (Mikrotik) forensic artifacts and vulnerabilities. - microsoft/routeros-scanner
GitHub - VirtualAlllocEx/Payload-Download-Cradles: This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
https://github.com/VirtualAlllocEx/Payload-Download-Cradles
https://github.com/VirtualAlllocEx/Payload-Download-Cradles
GitHub
GitHub - VirtualAlllocEx/Payload-Download-Cradles: This are different types of download cradles which should be an inspiration…
This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections. - VirtualAlllocEx/...