A collection of Golang projects designed specifically for red teamers and offensive security operations
https://github.com/EvilBytecode/GoRedOps
poc and exploit for CVE-2024-37051: JetBrains IDEs
https://github.com/LeadroyaL/CVE-2024-37051-EXP
Finding the slab cache for each object in Linux kernel using static analysis
https://albocoder.github.io/exploitation/linux%20kernel/2024/06/09/KernelStaticAnalysis
OneDorkForAll: An insane list of all dorks taken from everywhere from various different sources
https://github.com/HackShiv/OneDorkForAll
Slides and Codes used for the workshop Red Team Infrastructure Automation
https://github.com/dazzyddos/HSC24RedTeamInfra
Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)
https://github.com/sinsinology/CVE-2024-29849
CVE-2024-4577: PHP CGI Argument Injection (XAMPP)
https://github.com/Chocapikk/CVE-2024-4577
How to Achieve Eternal Persistence Part 3: How to access and recover replicated secrets
https://www.huntandhackett.com/blog/how-to-achieve-eternal-persistence-part-3
How do we write a shellcode to elevate privileges and gracefully return to userland?
https://mdanilor.github.io/posts/hevd-4
Kali Linux 2024.2 Release
(t64, GNOME 46 & Community Packages)
https://www.kali.org/blog/kali-linux-2024-2-release
Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing
https://github.com/W01fh4cker/CVE-2024-30043-XXE
TotalRecall: This tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to access information about your PC's activity snapshots
https://github.com/xaitax/TotalRecall
Poc for CVE-2024-32113
Apache OFBIZ Path traversal leading to RCE
https://github.com/Mr-xn/CVE-2024-32113
PoC for CVE-2024-27348
Apache HugeGraph Server Unauthenticated RCE
https://github.com/kljunowsky/CVE-2024-27348
Few lesser known tricks, quirks and features of C
https://jorenar.com/blog/less-known-c
BenevolentLoader: Shellcode loader using direct syscalls via Hell's Gate and payload encryption
https://github.com/jakobfriedl/BenevolentLoader
CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code
https://github.com/varwara/CVE-2024-26229
PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges required)
https://github.com/BlackSnufkin/Invoke-DumpMDEConfig
Develop your own C# Obfuscator
https://www.ribbiting-sec.info/posts/2024-06-05_csharp_obfuscator
An Introduction to Chrome Exploitation
https://www.matteomalvica.com/blog/2024/06/05/intro-v8-exploitation-maglev/
A PoC to disable TamperProtection and other Defender / MDE components
https://github.com/AlteredSecurity/Disable-TamperProtection
CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters
https://github.com/TAM-K592/CVE-2024-4577
MDE_Enum: is a comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reduction (ASR) rules
https://github.com/0xsp-SRD/MDE_Enum
EDR Internals for macOS and Linux
https://www.outflank.nl/blog/2024/06/03/edr-internals-macos-linux
Tools for analyzing EDR agents:
https://github.com/outflanknl/edr-internals
Guest vs Null session on Windows
https://sensepost.com/blog/2024/guest-vs-null-session-on-windows
Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)
https://github.com/sinsinology/CVE-2024-4358