WolfPack: combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale
https://github.com/RoseSecurity-Research/WolfPack
Bypassing Android 13 Restrictions with SecuriDropper
https://www.threatfabric.com/blogs/droppers-bypassing-android-13-restrictions
Fuzzer Development: The Soul of a New Machine
https://h0mbre.github.io/New_Fuzzer_Project
Source Code:
https://github.com/h0mbre/Lucid
No-Consolation: A BOF that runs unmanaged PEs inline
https://github.com/fortra/No-Consolation
Phishing With Dynamite
fakasler/phishing-with-dynamite-7d33d8fac038" rel="nofollow">https://medium.com/@fakasler/phishing-with-dynamite-7d33d8fac038
Breaking Barriers: Unmasking the Easy Password Validation Bypass in Security Key Registration | How a Dumb Frontend Led to 750 $ Bounty
https://thecyberneh.medium.com/breaking-barriers-unmasking-the-easy-password-validation-bypass-in-security-key-registration-4cb0d8103a93
Android Security Exploits YouTube Curriculum: A curated list of modern Android exploitation conference talks
https://github.com/actuator/Android-Security-Exploits-YouTube-Curriculum
Abusing Entra ID Misconfigurations to Bypass MFA
https://www.netspi.com/blog/technical/cloud-penetration-testing/abusing-entra-id-misconfigurations-to-bypass-mfa
C2_RedTeam_CheatSheets: Useful Cobalt Strike techniques learned from engagements
https://github.com/wsummerhill/C2_RedTeam_CheatSheets
HARpwn is a PowerShell module designed to streamline the extraction and sanitization of HARTokens from HTTP Archive (HAR) files
https://github.com/HCRitter/HARpwn
JS-Tap: Weaponizing JavaScript for Red Teams
https://trustedsec.com/blog/js-tap-weaponizing-javascript-for-red-teams
abuseACL: A python script to automatically list vulnerable Windows ACEs/ACLs
https://github.com/AetherBlack/abuseACL
SharpVeeamDecryptor: Decrypt Veeam database passwords
https://github.com/S3cur3Th1sSh1t/SharpVeeamDecryptor
Nuclei templates for honeypots detection
https://github.com/UnaPibaGeek/honeypots-detection
Persistence – Windows Telemetry
https://pentestlab.blog/2023/11/06/persistence-windows-telemetry
LdrLibraryEx: A small x64 library to load dll's into memory
https://github.com/Cracked5pider/LdrLibraryEx
ladder: Alternative to 12ft•io. Bypass paywalls with a proxy ladder and remove CORS headers from any URL
https://github.com/kubero-dev/ladder
Use Wasm to Bypass Latest Chrome v8sbx Again
numencyberlabs/use-wasm-to-bypass-latest-chrome-v8sbx-again-639c4c05b157" rel="nofollow">https://medium.com/@numencyberlabs/use-wasm-to-bypass-latest-chrome-v8sbx-again-639c4c05b157
UAC Bypass FUD: The UAC Bypass program is designed to run files with elevated privileges on Windows without requesting user permission or displaying the UAC screen. It provides a way to bypass User Account Control (UAC) restrictions for specific tasks
https://github.com/justhyak/UAC-Bypass-FUD
DFIR Resources: A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more
https://github.com/cyb3rmik3/MDE-DFIR-Resources
Bypassing an Admin Panel with SQL Injection
medz20876/blog-post-bypassing-an-admin-panel-with-sql-injection-20b844442711" rel="nofollow">https://medium.com/@medz20876/blog-post-bypassing-an-admin-panel-with-sql-injection-20b844442711
Social Media OSINT Tools Collection
https://github.com/osintambition/Social-Media-OSINT-Tools-Collection
autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump .py and hashcat
https://github.com/hmaverickadams/autoNTDS
Extension functionality for the NightHawk operator client
https://github.com/xforcered/DayBird
Enumerate/Bruteforce/Attack All the Things!
Presenting Legba
https://www.evilsocket.net/2023/11/02/Enumerate-Bruteforce-Attack-All-The-Things-Presenting-Legba
OLE object are still dangerous today — Exploiting Microsoft Office
https://github.com/edwardzpeng/presentations/tree/main/POC%202023
LdrLockLiberator: is a collection of techniques for escaping or otherwise forgoing Loader Lock while executing your code from DllMain or anywhere else the lock may be present
https://github.com/ElliotKillick/LdrLockLiberator