Bypass Paywalls Clean for Firefox
https://github.com/bpc-clone/bypass-paywalls-firefox-clean
Bypass Paywalls Clean for Chrome
https://github.com/bpc-clone/bypass-paywalls-chrome-clean
A series of methods used to detect kernel shellcode for tencent game safe race 2024
https://github.com/rogxo/search
New Backdoor, MadMxShell
https://www.zscaler.com/blogs/security-research/malvertising-campaign-targeting-it-teams-madmxshell
Analysis of Pupy RAT Used in Attacks Against Linux Systems
https://asec.ahnlab.com/en/64258
etw hook (syscall/infinity hook) compatible with the latest Windows version of PG
https://github.com/Oxygen1a1/etw_hook_latest
KExecDD:
Admin to Kernel code execution using the KSecDD driver
https://github.com/floesen/KExecDD
PasteBomb C2-less RAT: is a simple, yet powerful, remote administration Trojan (RAT) that allows you to execute terminal commands, send (D)DoS attacks, download files, and open messages in your victim's browser
https://github.com/marco-liberale/PasteBomb
pyMetaTwin: Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform
https://github.com/Cerbersec/pyMetaTwin
Element Android CVE-2024-26131, CVE-2024-26132 - Never Take Intents From Strangers
https://www.shielder.com/blog/2024/04/element-android-cve-2024-26131-cve-2024-26132-never-take-intents-from-strangers
Chaining N-days to Compromise All:
Part 4 — VMware Workstation Information leakage
https://blog.theori.io/chaining-n-days-to-compromise-all-part-4-vmware-workstation-information-leakage-44476b05d410
I Found An IDOR Flaw where users' attached pictures and documents were leaked
Ajakcybersecurity/i-found-an-idor-flaw-where-users-attached-pictures-and-documents-were-leaked-961d564ce72f" rel="nofollow">https://medium.com/@Ajakcybersecurity/i-found-an-idor-flaw-where-users-attached-pictures-and-documents-were-leaked-961d564ce72f
LetMeowIn: LSASS dumper using C++ and MASM x64
https://github.com/Meowmycks/LetMeowIn
HTB CTF: Cracking Passwords with Hashcat
https://infosecwriteups.com/htb-ctf-cracking-passwords-with-hashcat-6a932514e5c8
DceRPC-OS-Info: Golang implements obtaining Windows remote host information through dcerpc and ntlmssp
https://github.com/W01fh4cker/DceRPC-OS-Info
Story of a strange IDOR without ID
https://m7arm4n.medium.com/story-of-a-strange-idor-without-id-6735fd3dcd27
Unauthorized Admin Account Access via Google Authentication
https://nullr3x.medium.com/unauthorized-admin-account-access-via-google-authentication-a38d42577ac9
HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these tools but provides information about them. Easily install all of them with one script
https://github.com/ChrisJr404/HackerToolkit
BlackHat ASIA 2024 Slides
https://github.com/onhexgroup/Conferences/tree/main/BlackHat%20ASIA%202024-Slides
Backdooring Dotnet Applications
https://starkeblog.com/backdooring/dotnet/2024/04/19/backdooring-dotnet-applications
PoC for CVE-2024-20356:
A Command Injection vulnerability in Cisco's CIMC
https://github.com/nettitude/CVE-2024-20356
MagicDot: A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue
https://github.com/SafeBreach-Labs/MagicDot
CelestialSpark: A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust
https://github.com/Karkas66/CelestialSpark
Fake Dialog Boxes to Make Malware More Convincing
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/fake-dialog-boxes-to-make-malware-more-convincing
CVE-2024-20697: Windows Libarchive RCE Vulnerability
https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability
The Windows Registry Adventure
1: Introduction and research results
https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html
2: A brief history of the feature
https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-2.html
CVE-2024-2448: Authenticated Command Injection In Progress Kemp LoadMaster
https://rhinosecuritylabs.com/research/cve-2024-2448-kemp-loadmaster
IronSharpPack: is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then reflective load the C# project
https://github.com/BC-SECURITY/IronSharpPack
CVE-2024-21338: Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled
https://github.com/hakaioffsec/CVE-2024-21338
Using the LockBit builder to generate targeted ransomware
https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware
How I got JS Execution (DOM XSS) Via CSTI
amrkadry7/how-i-got-js-execution-dom-xss-via-csti-58a4171c2963" rel="nofollow">https://medium.com/@amrkadry7/how-i-got-js-execution-dom-xss-via-csti-58a4171c2963
Horus: is an all-in-one encompassing tool for investigations assistance, from API leveraging to compiling data too
https://github.com/6abd/horus