Automated Multi UAC BYPASS for win10|win11|ws2019|ws2022
(PS1)
https://github.com/x0xr00t/Automated-MUlti-UAC-Bypass
(PS1)
https://github.com/x0xr00t/Automated-MUlti-UAC-Bypass
👍6
Forwarded from white2hack 📚
God Penetration Testing Reference Bank
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet. This is a collection of resources, noscripts and easy to follow how-to's. I have been gathering (and continuing to gather) in preparation for the OSCP as well as for general pentesting. Feel free to use however you want!
GitHub
#pentest
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet. This is a collection of resources, noscripts and easy to follow how-to's. I have been gathering (and continuing to gather) in preparation for the OSCP as well as for general pentesting. Feel free to use however you want!
GitHub
#pentest
👍4❤2👎1
Forwarded from Source Byte (Anastasia 🐞)
ETW series
[ 1 ] ETW visualization
[ 2 ] Uncovering Windows Events
[ 3 ] ETW internals for security research and forensics
[ 4 ] Exploiting a “CVE-2020-1034” Vulnerability – In 35 Easy Steps or Less!
[ 5 ] Design issues of modern EDRs: bypassing ETW-based solutions
[ 6 ] A Primer On Event Tracing For Windows (ETW)
[ 7 ] Windows 10 ETW Events references collection
[ 8 ] evading EDR book [ 1 ] , [ 2 ]
[ 9 ] Detecting In-Memory Threats with Kernel ETW Call Stacks
[ 10 ] Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
[ 11 ] A Begginers All Inclusive Guide to ETW
[ 12 ] ETW References
[ 13 ] Give Me an E, Give Me a T, Give Me a W. What Do You Get? RPC! (pars events from the RPC ETW)
[ 14 ] Attacks on ETW Blind EDR Sensors ( black hat con )
[ 15 ] This write-up will present a case study of using ETW (Event Tracing for Windows) to analyze an active Cobalt Strike Beacon that was still active and communicating to it's C2 Server.
[ 16 ] Event Tracing for Windows (ETW): Your Friendly Neighborhood IPC Mechanism
[ 17 ] coming soon...
———
@islemolecule_source
[ 1 ] ETW visualization
[ 2 ] Uncovering Windows Events
[ 3 ] ETW internals for security research and forensics
[ 4 ] Exploiting a “CVE-2020-1034” Vulnerability – In 35 Easy Steps or Less!
[ 5 ] Design issues of modern EDRs: bypassing ETW-based solutions
[ 6 ] A Primer On Event Tracing For Windows (ETW)
[ 7 ] Windows 10 ETW Events references collection
[ 8 ] evading EDR book [ 1 ] , [ 2 ]
[ 9 ] Detecting In-Memory Threats with Kernel ETW Call Stacks
[ 10 ] Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
[ 11 ] A Begginers All Inclusive Guide to ETW
[ 12 ] ETW References
[ 13 ] Give Me an E, Give Me a T, Give Me a W. What Do You Get? RPC! (pars events from the RPC ETW)
[ 14 ] Attacks on ETW Blind EDR Sensors ( black hat con )
[ 15 ] This write-up will present a case study of using ETW (Event Tracing for Windows) to analyze an active Cobalt Strike Beacon that was still active and communicating to it's C2 Server.
[ 16 ] Event Tracing for Windows (ETW): Your Friendly Neighborhood IPC Mechanism
[ 17 ] coming soon...
———
@islemolecule_source
👍4🔥1
Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.
🔎GitHub
———
@islemolecule_source
🔎GitHub
———
@islemolecule_source
👍5
Course materials for Malware Analysis by RPISEC
https://github.com/RPISEC/Malware/tree/master/Lectures
https://github.com/RPISEC/Malware/tree/master/Lectures
👍2
What are the resources to learn malware analysis?
https://www.quora.com/What-are-the-resources-to-learn-malware-analysis
https://www.quora.com/What-are-the-resources-to-learn-malware-analysis
Quora
What are the resources to learn malware analysis?
1 person wants answers to this question. Be the first to answer.
👍2
Some good resources for malware analysis and reverse engineering etc..
https://github.com/rshipp/awesome-malware-analysis
https://github.com/rshipp/awesome-malware-analysis
👍3
👍4
🥰7
Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C
https://github.com/0x4141414141/Malware-Devlopment
https://github.com/0x4141414141/Malware-Devlopment
👍6
IACA Dark Web Investigation Support
Provided by International Anti Crime Academy (IACA) The Netherlands
https://iaca-darkweb-tools.com/
#Threat_Intelligence
Provided by International Anti Crime Academy (IACA) The Netherlands
https://iaca-darkweb-tools.com/
#Threat_Intelligence
👍3❤1
assembly programming with focus on Windows
credits : Siew Yi Liang
https://sonictk.github.io/asm_tutorial/
credits : Siew Yi Liang
https://sonictk.github.io/asm_tutorial/
👍8
Windows Secrets Extraction: A Summary
synacktiv😍
https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary
https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary
Synacktiv
Windows secrets extraction: a summary
🔥7👍1