Understanding Malware Patching: Resources
https://medium.com/phrozen/understanding-malware-patching-resources-81650bb6190d
Freeway: WiFi Penetration Testing & Auditing Tool
https://github.com/FLOCK4H/Freeway
Muraider - Automating the detection & Exploitation of CVE-2024-32640 \ SQLi in Mura/Masa CMS
https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS
PoC for LPE bug in xbox gaming service
https://github.com/Wh04m1001/GamingServiceEoP5
PoC for CVE-2024-29895 Cacti RCE
https://github.com/Stuub/CVE-2024-29895-CactiRCE-PoC
PoC for CVE-2024-27130 QNAP RCE
https://github.com/watchtowrlabs/CVE-2024-27130
Apache-OFBiz-Directory-Traversal-exploit
https://github.com/absholi7ly/Apache-OFBiz-Directory-Traversal-exploit
ETWInspector: An Event Tracing for Windows (ETW) tool that allows you to enumerate Manifest & MOF providers, as well as collect events from desired providers
https://github.com/jsecurity101/ETWInspector
Offensive IoT for Red Team Implants (Part 2)
https://www.blackhillsinfosec.com/offensive-iot-for-red-team-implants-part-2
BlueToolkit: is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices.
Could be used in the vulnerability research, penetration testing and bluetooth hacking
https://github.com/sgxgsx/BlueToolkit
PoC for CVE-2024-27804 Apple Products Multiple Vulnerabilities
https://github.com/R00tkitSMM/CVE-2024-27804
WordPress Admin Account Creation and Reverse Shell (CVE-2024-27956)
https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956
CVE-2024-4761 v8 oob write
https://docs.google.com/document/d/e/2PACX-1vSpCvBik81OppzMXbPjb0uRlWTdn4I1kttNSlbHtNMCT3xZJJiyKAsCcUxzNBimlBdXoKxrktlgJjOZ/pub
Bypassing WAFs to Exploit CSPT Using Encoding Levels
https://matanber.com/blog/cspt-levels
A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by threat actors & those which have been incorporated into open-source user-mode rootkits
https://github.com/JanielDary/ELFieScanner
CVE-2024-2887: A Pwn2Own Winning Bug in Google Chrome
https://www.zerodayinitiative.com/blog/2024/5/2/cve-2024-2887-a-pwn2own-winning-bug-in-google-chrome
CVE-2024-21115: An Oracle VirtualBox LPE Used to Win Pwn2Own
https://www.zerodayinitiative.com/blog/2024/5/9/cve-2024-21115-an-oracle-virtualbox-lpe-used-to-win-pwn2own
SharpPersistSD:
A Post-Compromise granular, fully reflective, simple and convenient .NET library to embed persistency to persistency by abusing Security Descriptors of remote machines
https://github.com/cybersectroll/SharpPersistSD
call a webhook on opening Google doc
https://gist.github.com/radk2/45e729f5859d76197d8f7e6b53dd6d71
darkPulse: is a shellcode Packer written in go, used to generate a variety of shellcode loaders
https://github.com/fdx-xdf/darkPulse
HermitPurple is part of an extensive toolkit aimed at enhancing digital investigative capabilities within the Maltego framework
https://github.com/CyberSecurityUP/HermitPurple-Maltegoce
Payload Trends in Malicious OneNote Samples
https://unit42.paloaltonetworks.com/payloads-in-malicious-onenote-samples
This project can bypass most of the AC except for some perverts that enable VT to monitor page tables
https://github.com/3499409631/ReadPhysicalMemory-Without-API
OdinLdr: Cobaltstrike UDRL with memory evasion
https://github.com/RtlDallas/OdinLdr
400k Linux servers compromised for cryptotheft and financial gain
https://www.welivesecurity.com/en/eset-research/ebury-alive-unseen-400k-linux-servers-compromised-cryptotheft-financial-gain
Windows Bootkits Guide
https://artemonsecurity.blogspot.com/2024/05/windows-bootkits-guide.html
Response Filter Denial of Service (RFDoS): shut down a website by triggering WAF rule
https://blog.sicuranext.com/response-filter-denial-of-service-a-new-way-to-shutdown-a-website
DumpDriver: this is an idea to load your driver before a boot-time Anti-cheat(vgk, faceit)
https://github.com/Oliver-1-1/DumpDriver
Visualizing ACLs with Adalanche
https://lsecqt.github.io/Red-Teaming-Army/active-directory/enumeration/visualizing-acls-with-adalanche/
IPPrintC2: PoC for using MS Windows printers for persistence / command and control via Internet Printing
https://github.com/Diverto/IPPrintC2
Side-by-Side with HelloJackHunter: Unveiling the Mysteries of WinSxS
https://blog.zsec.uk/hellojackhunter-exploring-winsxs
Read Remote Process Commandline BOF
BOF to read the startup arguments of a remote process, when provided a process ID (PID)
https://github.com/EspressoCake/ReadRemoteProcessCommandline_BOF