P/Invoke definitions from the now offline pinvoke•net
https://github.com/ricardojoserf/p-invoke.net
The Gitbook: https://www.p-invoke.net
Hijacking & Spoofing Context Menu Options
https://mrd0x.com/sentinelone-persistence-via-menu-context
TA577’s Unusual Attack Chain Leads to NTLM Data Theft
https://www.proofpoint.com/us/blog/threat-insight/ta577s-unusual-attack-chain-leads-ntlm-data-theft
Using form hijacking to bypass CSP
https://portswigger.net/research/using-form-hijacking-to-bypass-csp
SharpThief: Steal a file's icon, resource information, version information, modification time, and digital signature with one click to reduce program entropy
https://github.com/INotGreen/SharpThief
How to Make Nmap Recognize New Services
https://shufflingbytes.com/posts/how-to-make-nmap-recognize-new-services
Exploit for CVE-2024-27198 - TeamCity Server
https://github.com/yoryio/CVE-2024-27198
CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)
https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed
linjector-rs: Code injection on Android without ptrace
https://github.com/erfur/linjector-rs
Cyber-security-practice: ALL cyber-security-practice, include exploit loophole , web attack ,cryptographic, system explotation, developing tools and so on
https://github.com/Stander-by/Cyber-security-practice
pmesh: is an all-in-one service manager, reverse proxy, and enterprise service bus. It is designed to be a simple and powerful all-in-one replacement for a wide variety of tools commonly deployed in web services
https://github.com/pme-sh/pmesh
Passing arguments via rundll32.exe to function exported by DLL
https://stmxcsr.com/micro/rundll-parse-args.html
Automate evasion and compilation of tools
https://tierzerosecurity.co.nz/2024/03/03/teamcity-sharpwmi-evasion.html
Code injection on Android without ptrace
https://erfur.github.io/blog/dev/code-injection-without-ptrace
FuncAddressPro: demonstrates a sophisticated method of using an external assembly file to dynamically retrieve function addresses, serving as an advanced alternative to the standard GetProcAddress
https://github.com/WKL-Sec/FuncAddressPro
Cybersecurity threatscape: Q4 2023
https://www.ptsecurity.com/ww-en/analytics/cybersecurity-threatscape-2023-q4
Smishing with EvilGophish
https://fin3ss3g0d.net/index.php/2024/03/04/smishing-with-evilgophish
Persistence – Explorer
https://pentestlab.blog/2024/03/05/persistence-explorer
List of 39 Documented Windows Persistence Techniques
https://pentestlab.blog/methodologies/red-teaming/persistence
Reverse Engineering Protobuf Definitions From Compiled Binaries
https://arkadiyt.com/2024/03/03/reverse-engineering-protobuf-definitiions-from-compiled-binaries
How I Found Multiple XSS Vulnerabilities Using Unknown Techniques
https://infosecwriteups.com/how-i-found-multiple-xss-vulnerabilities-using-unknown-techniques-74f8e705ea0d
ComPromptMized: Unleashing Zero-click Worms that Target GenAI-Powered Applications
https://github.com/StavC/ComPromptMized
Taking On A Hardened Windows System
https://assume-breach.medium.com/home-grown-red-team-taking-on-a-hardened-windows-system-f31796ad3fc2
sebel: is a Go package that provides functionality for checking SSL/TLS certificates against malicious connections, by identifying and blacklisting certificates used by botnet command and control (C&C) servers
https://github.com/teler-sh/sebel
Taking a deep dive into SmokeLoader
https://farghlymal.github.io/SmokeLoader-Analysis
OWASP Top 10 explained (3) : SQL Injection
https://lab.scub.net/owasp-top-10-3-sql-injection-78a59edba83b
APT37's ROKRAT HWP Object Linking and Embedding
https://www.0x0v1.com/rearchive-rokrat-hwp