Crawl4AI: is a powerful, free web crawling service designed to extract useful information from web pages and make it accessible for large language models (LLMs) and AI applications
https://github.com/unclecode/crawl4ai
Offensive IoT for Red Team Implants - Part 1
https://www.blackhillsinfosec.com/offensive-iot-for-red-team-implants-part-1
Windows Memory Forensics
https://blog.cyber5w.com/anomalies-hunting-in-windows-memory-dump
RunasPy: is an utility to run specific processes with different permissions than the user's current logon provides using explicit credentials
https://github.com/rkbennett/RunAsPy
PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal. A prototype PoC for the automation of vulnerability analysis on targets running CData applications on an embedded Jetty server
https://github.com/Stuub/CVE-2024-31848-PoC
When "Phish-Proof" Gets Hooked
https://www.persistent-security.net/post/when-phish-proof-gets-hooked
TunnelVision (CVE-2024-3661): How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak
https://www.leviathansecurity.com/blog/tunnelvision
LLM Pentest: Leveraging Agent Integration For RCE
https://www.blazeinfosec.com/post/llm-pentest-agent-hacking
ShellServe: Multi-client network fileserver with integrated shell functionality, crafted in C using system calls for efficient and direct file and command processing
https://github.com/7etsuo/ShellServe
A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine
https://github.com/synacktiv/Invoke-RunAsWithCert
DnsClientX: DnsClient for .NET and PowerShell
https://github.com/EvotecIT/DnsClientX
epeius: Deploy Trojan using a Serverless approach
https://github.com/ca110us/epeius
CVE-2024-24787-PoC On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive
https://github.com/LOURC0D3/CVE-2024-24787-PoC
DV_NEW: This is the combination of multiple evasion techniques. It is using direct syscalls to bypass user-mode EDR hooking and also to avoid static detection of syscalls instruction in stub I am using egg hunt technique
https://github.com/Offensive-Panda/DV_NEW
1,000,000 requests 2FA bypass
https://imwaiting18.medium.com/i-sent-1-000-000-requests-to-a-server-dcb6b41d5d7f
Inject DLLs into the Windows Explorer using icons
https://github.com/0xda568/IconJector
Devfile file write vulnerability in GitLab
https://gitlab-com.gitlab.io/gl-security/security-tech-notes/security-research-tech-notes/devfile
Lateral movement and on-prem NT hash dumping with Microsoft Entra Temporary Access Passes
https://dirkjanm.io/lateral-movement-and-hash-dumping-with-temporary-access-passes-microsoft-entra
Process_Ghosting: is a technique in which a process is created from a delete pending file. This means the created process is not backed by a file. This is an evasion technique
https://github.com/BlackHat-Ashura/Process_Ghosting
Burpscript adds dynamic scripting abilities to Burp Suite, allowing you to write scripts in Python or Javascript to manipulate HTTP requests and responses
https://github.com/ivision-research/burpscript
Microsoft Graph API post-exploitation toolkit
https://github.com/mlcsec/SharpGraphView
Microsoft Warbird and PMP
https://security-explorations.com/microsoft-warbird-pmp.html
Full Disclosure: A Look at a Recently Patched Microsoft Graph Logging Bypass - GraphNinja
https://trustedsec.com/blog/full-disclosure-a-look-at-a-recently-patched-microsoft-graph-logging-bypass-graphninja