⭕️ آنالیز فایل APK ساخته شده با ابزار MSFVenom (از فریمورک Metasploit)
- راهاندازی آزمایشگاه و ساخت Payload
- تحلیل ایستا با استفاده از Jadx
- تحلیل داینامیک با استفاده از Frida و آنالیز مموری
https://kousha1999.github.io/posts/2022/msfvenom-android-malware-analysis
#malware #android
@securation
- راهاندازی آزمایشگاه و ساخت Payload
- تحلیل ایستا با استفاده از Jadx
- تحلیل داینامیک با استفاده از Frida و آنالیز مموری
https://kousha1999.github.io/posts/2022/msfvenom-android-malware-analysis
#malware #android
@securation
Kousha Zanjani (INVOXES) Blog
Analyzing MSFVenom Android Payload (Malware)
MSFVenom is a versatile and widely used tool for generating payloads and shellcodes as part of the Metasploit Framework. It allows users to create customized payloads for various platforms, including Android, for penetration testing purposes. I want to analyze…
👍8❤4👎1
⭕️ NTLMRelay2Self
Escalate privileges locally by forcing the system you landed initial access on to reflectively authenticate over HTTP to itself and forward the received connection to an HTTP listener (ntlmrelayx) configured to relay to DC servers over LDAP/LDAPs for either setting shadow credentials or configuring RBCD.
https://github.com/med0x2e/NTLMRelay2Self
#privesc #relay #webdav #lpe
@securation
Escalate privileges locally by forcing the system you landed initial access on to reflectively authenticate over HTTP to itself and forward the received connection to an HTTP listener (ntlmrelayx) configured to relay to DC servers over LDAP/LDAPs for either setting shadow credentials or configuring RBCD.
https://github.com/med0x2e/NTLMRelay2Self
#privesc #relay #webdav #lpe
@securation
GitHub
GitHub - med0x2e/NTLMRelay2Self: An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).
An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav). - med0x2e/NTLMRelay2Self
👍2👎1
This media is not supported in your browser
VIEW IN TELEGRAM
MyBB 1.8.29 - Remote Code Execution (RCE) (Authenticated)
https://github.com/Altelus1/CVE-2022-24734
#MyBB #RCE #Auth_R
@securation
https://github.com/Altelus1/CVE-2022-24734
#MyBB #RCE #Auth_R
@securation
👍3👎3
⭕️Passive/Active Information Gathering: Subdomain Enumeration
https://medium.com/@fath3ad.22/passive-active-information-gathering-subdomain-enumeration-e5538c3d3ecc
#Web #bugbounty
@securation
https://medium.com/@fath3ad.22/passive-active-information-gathering-subdomain-enumeration-e5538c3d3ecc
#Web #bugbounty
@securation
Medium
Passive/Active Information Gathering: Subdomain Enumeration
This post is design to share some of the information I’ve learned while working through the Information Gathering- Web Edition module in…
⭕️ SysWhispers Shellcode Loader
- Compiles raw shellcode and compile a C++ stub
that has been integrated with SysWhispers in order to bypass AV/EDR.
The included python builder will work on any Linux system that has Mingw-w64 installed.
- 5 different ways to execute your shellcode
https://github.com/icyguider/Shhhloader
#loader #bypass #av #edr #windows #shellcode
@securation
- Compiles raw shellcode and compile a C++ stub
that has been integrated with SysWhispers in order to bypass AV/EDR.
The included python builder will work on any Linux system that has Mingw-w64 installed.
- 5 different ways to execute your shellcode
https://github.com/icyguider/Shhhloader
#loader #bypass #av #edr #windows #shellcode
@securation
GitHub
GitHub - icyguider/Shhhloader: Syscall Shellcode Loader (Work in Progress)
Syscall Shellcode Loader (Work in Progress). Contribute to icyguider/Shhhloader development by creating an account on GitHub.
👍3
Security Analysis | Code Audit |Quiz 1.png
365 KB
کارکرد کد بالا چیه
آسیب پذیر هست یا نه
اگر هست اسم آسیب پذیری چیه و اکسپلویتش چجوریه؟
کامنت کنید.
آسیب پذیر هست یا نه
اگر هست اسم آسیب پذیری چیه و اکسپلویتش چجوریه؟
کامنت کنید.
👍4🔥1
⭕️Securing AWS Lambda function URLs
Learn about the security risks of misconfigured Lambda function URLs and how to properly secure them.
https://www.wiz.io/blog/securing-aws-lambda-function-urls
#aws #cloud #security
@securation
Learn about the security risks of misconfigured Lambda function URLs and how to properly secure them.
https://www.wiz.io/blog/securing-aws-lambda-function-urls
#aws #cloud #security
@securation
wiz.io
Securing AWS Lambda function URLs | Wiz Blog
Learn about the security risks of misconfigured Lambda function URLs and how to properly secure them.
⭕️Combination of 2 PoCs for bypassing Credential Guard with in-memory invocation
PoC 1 (patch wdigest.dll):
https://gist.github.com/N4kedTurtle/8238f64d18932c7184faa2d0af2f1240
PoC 2 (find variable offsets in runtime):
https://github.com/itm4n/Pentest-Windows/blob/main/CredGuardBypassOffsets/poc.cpp
Merged:
https://gist.github.com/snovvcrash/43e976779efdd20df1596c6492198c99
#lsass #wdigest #credguard
@securation
PoC 1 (patch wdigest.dll):
https://gist.github.com/N4kedTurtle/8238f64d18932c7184faa2d0af2f1240
PoC 2 (find variable offsets in runtime):
https://github.com/itm4n/Pentest-Windows/blob/main/CredGuardBypassOffsets/poc.cpp
Merged:
https://gist.github.com/snovvcrash/43e976779efdd20df1596c6492198c99
#lsass #wdigest #credguard
@securation
👍2👎2
⭕️ Debugging and Reversing ALPC
https://csandker.io/2022/05/29/Debugging-And-Reversing-ALPC.html
#windows #internals
@securation
https://csandker.io/2022/05/29/Debugging-And-Reversing-ALPC.html
#windows #internals
@securation
👍1👎1
CVE-2022-22954-main.zip
3.5 KB
⭕️VMware Workspace ONE Access and Identity Manager RCE via SSTI.
exploit+payload+shodan
#vmware #cve
@securation
CVE-2022-22954 - PoC SSTI
*exploit+payload+shodan
#vmware #cve
@securation