/ SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated proof-of-concept (PoC) exploits.
https://github.com/xaitax/SploitScan
https://github.com/xaitax/SploitScan
GitHub
GitHub - xaitax/SploitScan: SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities…
SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits. - xaitax/SploitScan
Forwarded from OpenBLD.net (Yevgeniy Goncharov)
New OpenBLD points of presence have been added in the world thanks to AlphaVPS!
AlphaVPS.com - Fast & Cheap VPS, Cloud Servers and few servers from AlphaVPS stay which located in Bulgaria and Germany joined in to OpenBLD.net ecosystem.
As you know one of the our prioritites - fast DoH/DoT responses and 1GBit/s from AlphaVPS it is good base for this requirements.
One server already available for users (see status of Ada-h4), second server will be available in the next few days. Enjoy it 🚀
P.S. Few times ago I posted OpenBLD.net IPv6 Pre-Release notice, in few near weeks I'll plan implement DoH/DoT IPv6 for users in Europe, I'll tell about this later 😎...
Please open Telegram to view this post
VIEW IN TELEGRAM
Talos IOC data
this page with the latest indicators of compromise (IOCs):
https://github.com/Cisco-Talos/IOCs/tree/main
this page with the latest indicators of compromise (IOCs):
https://github.com/Cisco-Talos/IOCs/tree/main
GitHub
GitHub - Cisco-Talos/IOCs: Indicators of Compromise
Indicators of Compromise. Contribute to Cisco-Talos/IOCs development by creating an account on GitHub.
Cobalt Strike Profiles for EDR Evasion
https://github.com/EvilGreys/Cobalt-Strike-Profiles-for-EDR-Evasion
https://github.com/EvilGreys/Cobalt-Strike-Profiles-for-EDR-Evasion
Cvemap from ProjectDiscovery
Infomation in cvemap based on:
- Known Exploited Vulnerabilities Catalog (KEV)
- Exploit Prediction Scoring System (EPSS)
- Proofs of Concept (POCs)
- HackerOne CVE Discovery
- Nuclei Templates
- and more..
https://blog.projectdiscovery.io/announcing-cvemap-from-projectdiscovery/
Infomation in cvemap based on:
- Known Exploited Vulnerabilities Catalog (KEV)
- Exploit Prediction Scoring System (EPSS)
- Proofs of Concept (POCs)
- HackerOne CVE Discovery
- Nuclei Templates
- and more..
https://blog.projectdiscovery.io/announcing-cvemap-from-projectdiscovery/
Forwarded from OpenBLD.net (Yevgeniy Goncharov)
Few month ago I stared develop from scratch zDNS service, now it's can:
- Restrict DNS queries by type like as A, AAAA, HTTPS, CNAME, MX, PTR..
- Balancing DNS traffic between upstream servers
- Providing Prometheus metrics
- DNS responses caching by custom TTL
- Has few working modes - Zero Trust, Allow/Blocking
- Has separated "Permanent" mode with additional custom upstream DNS servers
- Can load allow/block lists from local and remote through HTTP(S)
- Create/Delete custom users with different configs and hosts files
- and more...
New opportunities, features, looking forward, and info about of new OpenBLD.net Personal Usage Testing pre-relase see here:
https://openbld.net/blog/zdns-big-updates-and-features/
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Sys-Admin InfoSec
/ Phishing Microsoft Teams for initial access
https://pushsecurity.com/blog/phishing-microsoft-teams-for-initial-access/
https://pushsecurity.com/blog/phishing-microsoft-teams-for-initial-access/
Push Security
Phishing Microsoft Teams for initial access
In this article, we will cover a number of spoofing and phishing strategies that can be employed by external attackers to target an organization using Teams.
Excessive Expansion: Uncovering Critical Security Vulnerabilities in Jenkins
https://www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/
https://www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/
Sonarsource
Excessive Expansion: Uncovering Critical Security Vulnerabilities in Jenkins
This blog uncovers two vulnerabilities, a Critical and High severity, recently discovered by our research team. Exploiting these vulnerabilities, attackers have the potential to gain Remote Code Execution on a Jenkins instance.
/ Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
The DFIR Report
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Key Takeaways In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol (RDP) host, leading to data exfiltration and the deployment of Trigona ransomwar…
/ ExecIT - DLL Shellcode self-inyector/runner based on HWSyscalls, ideally thought to be executed with rundll32. May grant fileless execution if victim endpoint has access to attacker-controlled SMB share:
https://github.com/florylsk/ExecIT
https://github.com/florylsk/ExecIT
net/ipv6: Revert remove expired routes with a separated list of routes
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dade3f6a1e4e35a5ae916d5e78b3229ec34c78ec
Ref: https://nvd.nist.gov/vuln/detail/CVE-2023-6200
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dade3f6a1e4e35a5ae916d5e78b3229ec34c78ec
Ref: https://nvd.nist.gov/vuln/detail/CVE-2023-6200
FACTION - Pen Test Report Generation and Assessment Collaboration
https://github.com/factionsecurity/faction
https://github.com/factionsecurity/faction
GitHub
GitHub - factionsecurity/faction: Pen Test Report Generation and Assessment Collaboration
Pen Test Report Generation and Assessment Collaboration - factionsecurity/faction
/ Linux Kernel Exploitation: Getting started & BOF
https://santaclz.github.io/2023/11/03/Linux-Kernel-Exploitation-Getting-started-and-BOF.html
https://santaclz.github.io/2023/11/03/Linux-Kernel-Exploitation-Getting-started-and-BOF.html
santaclz’s blog
Linux Kernel Exploitation: Getting started & BOF
Motivation
/ runc: CVE-2024-21626: high severity container breakout attack
https://www.openwall.com/lists/oss-security/2024/01/31/6
https://www.openwall.com/lists/oss-security/2024/01/31/6
RedTeam-Checker
automated tool designed to monitor the persistence of backdoors and default settings on compromised machines over time:
https://github.com/Drakiat/RedTeam-Checker
automated tool designed to monitor the persistence of backdoors and default settings on compromised machines over time:
https://github.com/Drakiat/RedTeam-Checker
GitHub
GitHub - Drakiat/Checker: A graphical automation to monitor if backdoors/default settings are still active on the compromised machines…
A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time. - GitHub - Drakiat/Checker: A graphical automation to monitor if backdoors/d...
Buying Spying - Google report about of commercial spyware
https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Buying_Spying_-_Insights_into_Commercial_Surveillance_Vendors.pdf
https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Buying_Spying_-_Insights_into_Commercial_Surveillance_Vendors.pdf