w0rk3r's Windows Hacking Library – Telegram
w0rk3r's Windows Hacking Library
1.55K subscribers
10 photos
577 links
Manual job, I'm not a bot ;)

@BlueTeamLibrary
@W0rk3r
Download Telegram
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
Breach: From Recon to penetrating the perimeter, to actions on the target

https://youtu.be/e99iQC-dod8

@SecTalks
SharpLocker

SharpLocker helps get current user credentials by popping a fake Windows lock screen, all output is sent to Console which works perfect for Cobalt Strike.

https://github.com/Pickfordmatt/SharpLocker

@WindowsHackingLibrary
Osquery for Windows access right misconfiguration Elevation of Privilege (CVE-2019-3567)

https://offsec.provadys.com/osquery-windows-acl-misconfiguration-eop.html

@WindowsHackingLibrary
Your Session Key is My Session Key: How to Retrieve the Session Key for Any Authentication

https://blog.preempt.com/your-session-key-is-my-session-key

@WindowsHackingLibrary
Explaining the inner workings of AMSI and describing a new bypass technique

https://www.contextis.com/en/blog/amsi-bypass

@WindowsHackingLibrary