Best search 🔎 engines for Pentesters and Security Professionals.
→ google .com
→ Shodan .io
→ Censys .io
→ Hunter .io
→ redhuntlabs .com
→ fullhunt .io
→ onyphe .io
→ fofa .so
→ socradar .io
→ synapsint .com
→ binaryedge .io
→ ivre .rocks
→ crt .sh
→ spyse .com
→ vulners .com
→ PublicWWW .com
→ Pulsedive .com
→ ZoomEye .org
→ intelx .io
→ WiGLE .net
→ reposify .com
→ viz. greynoise .io
→ google .com
→ Shodan .io
→ Censys .io
→ Hunter .io
→ redhuntlabs .com
→ fullhunt .io
→ onyphe .io
→ fofa .so
→ socradar .io
→ synapsint .com
→ binaryedge .io
→ ivre .rocks
→ crt .sh
→ spyse .com
→ vulners .com
→ PublicWWW .com
→ Pulsedive .com
→ ZoomEye .org
→ intelx .io
→ WiGLE .net
→ reposify .com
→ viz. greynoise .io
GitHub - mzfr/liffy: Local file inclusion exploitation tool
https://github.com/mzfr/liffy
https://github.com/mzfr/liffy
GitHub
GitHub - mzfr/liffy: Local file inclusion exploitation tool
Local file inclusion exploitation tool. Contribute to mzfr/liffy development by creating an account on GitHub.
🔥1
GitHub - Cracked5pider/Ekko: Sleep Obfuscation
https://github.com/Cracked5pider/Ekko
https://github.com/Cracked5pider/Ekko
GitHub
GitHub - Cracked5pider/Ekko: Sleep Obfuscation
Sleep Obfuscation. Contribute to Cracked5pider/Ekko development by creating an account on GitHub.
MSRPC-to-ATTACK/MS-DFSNM.md at main · jsecurity101/MSRPC-to-ATTACK · GitHub
https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-DFSNM.md
https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/main/documents/MS-DFSNM.md
GitHub
MSRPC-to-ATTACK/documents/MS-DFSNM.md at main · jsecurity101/MSRPC-to-ATTACK
A repository that maps commonly used attacks using MSRPC protocols to ATT&CK - jsecurity101/MSRPC-to-ATTACK
New NTLM Relay Attack Lets Attackers Take Control Over Windows Domain
https://thehackernews.com/2022/06/new-ntlm-relay-attack-lets-attackers.html?m=1
https://thehackernews.com/2022/06/new-ntlm-relay-attack-lets-attackers.html?m=1
Domain Escalation – sAMAccountName Spoofing – Penetration Testing Lab
https://pentestlab.blog/2022/01/10/domain-escalation-samaccountname-spoofing/
https://pentestlab.blog/2022/01/10/domain-escalation-samaccountname-spoofing/
Penetration Testing Lab
Domain Escalation – sAMAccountName Spoofing
Computer accounts have the $ sign appended at the end of their names in contrast with standard user accounts. By default Microsoft operating systems lack of security controls and hardening that wou…
Attacking With WebView2 Applications | mr.d0x
https://mrd0x.com/attacking-with-webview2-applications/
https://mrd0x.com/attacking-with-webview2-applications/
Mrd0X
Security Research | mr.d0x
Providing security research and red team techniques
GitHub - mgeeky/ThreadStackSpoofer: Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts.
https://github.com/mgeeky/ThreadStackSpoofer
https://github.com/mgeeky/ThreadStackSpoofer
GitHub
GitHub - mgeeky/ThreadStackSpoofer: Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better…
Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and analysts. - mgeeky/ThreadStackSpoofer
Unrar Path Traversal Vulnerability affects Zimbra Mail
https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/
https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/
Sonarsource
Unrar Path Traversal Vulnerability affects Zimbra Mail
We discovered a vulnerability in Zimbra Enterprise Email that allows an unauthenticated, remote attacker fully take over Zimbra instances via a flaw in unrar.
👍1
Mez0: Vulpes: Obfuscating Memory Regions with Timers
https://mez0.cc/posts/vulpes-obfuscating-memory-regions/
https://mez0.cc/posts/vulpes-obfuscating-memory-regions/
Game Of Active Directory v2 | Mayfly
https://mayfly277.github.io/posts/GOADv2/
https://mayfly277.github.io/posts/GOADv2/
Mayfly
Game Of Active Directory v2
Yes another pentester blog..
GitHub - winterknife/PINKPANTHER: Windows x64 handcrafted token stealing kernel-mode shellcode
https://github.com/winterknife/PINKPANTHER
https://github.com/winterknife/PINKPANTHER
GitHub
GitHub - winterknife/PINKPANTHER: Windows x64 handcrafted token stealing kernel-mode shellcode
Windows x64 handcrafted token stealing kernel-mode shellcode - winterknife/PINKPANTHER