ItsNotASecurityBoundary: is an exploit that leverages False File Immutability assumptions in Windows Code Integrity (ci.dll) to trick it into accepting an improperly-signed security catalog containing fraudulent authentihashes
https://github.com/gabriellandau/ItsNotASecurityBoundary
CVE-2024-34102: Unauthenticated Magento XXE
https://github.com/th3gokul/CVE-2024-34102
Ransomware written in go, encrypt - decrypt
https://github.com/EvilBytecode/ThunderKitty-Ransomware
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, VM Detect package
https://github.com/EvilBytecode/PyDefender
Escaping the Sandbox On Windows - HITB x PHDays 2024
https://github.com/edwardzpeng/presentations/tree/main/HITB%20x%20PHDays%202024
Putting the C2 in C2loudflare
https://labs.jumpsec.com/putting-the-c2-in-c2loudflare
Polyfill supply chain attack hits 100K+ sites
https://sansec.io/research/polyfill-supply-chain-attack
PoC and Exploit for CVE-2024-29943
A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE
https://github.com/bjrjk/CVE-2024-29943
AWS “Segmentation Test” Methodology for Pentesters
alt3kx/my-aws-segmentation-test-methodology-for-pentesters-v1-0-bc110753c1e9" rel="nofollow">https://medium.com/@alt3kx/my-aws-segmentation-test-methodology-for-pentesters-v1-0-bc110753c1e9
MSC Dropper is a Python script designed to automate the creation of MSC (Microsoft Management Console) files with customizable payloads for arbitrary execution
https://github.com/ZERODETECTION/MSC_Dropper
Cybersecurity in the SMB space — a growing threat
https://securelist.com/smb-threat-report-2024
RemoteKrbRelay: Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
https://github.com/CICADA8-Research/RemoteKrbRelay
This is a simple proof-of-concept project demonstrating how you can hide memory regions of your process from other processes
https://github.com/SamuelTulach/MemoryGuard
Part 8: Reverse Shell Via Dll Hijacking
https://sid4hack.medium.com/malware-development-part-8-reverse-shell-via-dll-hijacking-ce48f5ebbafe
Sinon: Modular Windows Burn-In Automation with Generative AI for Deception
https://github.com/referefref/sinon
SharpIncrease can bypass many security measures and can be used with various file extensions
https://github.com/mertdas/SharpIncrease
An AWS Administrator Identity Crisis: Part 1
https://posts.specterops.io/an-aws-administrator-identity-crisis-part-1-919e6171ec0a
Attacks Against Linux SSH Services
https://asec.ahnlab.com/en/66695
Attackers Exploiting Public Cobalt Strike Profiles
https://unit42.paloaltonetworks.com/attackers-exploit-public-cobalt-strike-profiles
OTP Bypass through Session Manipulation
n4if/otp-bypass-through-session-manipulation-d73deceaa42f" rel="nofollow">https://medium.com/@n4if/otp-bypass-through-session-manipulation-d73deceaa42f
Binary Golf 5 - Linux shellcoding ideas
https://github.com/yo-yo-yo-jbo/bggp5_linux_shellcode
Find Sensitive Data’s using via network analysis
test123cybertest/find-sensitive-datas-using-via-network-analysis-make-me-250-a0b23b0cb03b" rel="nofollow">https://medium.com/@test123cybertest/find-sensitive-datas-using-via-network-analysis-make-me-250-a0b23b0cb03b
A Novel DoS Vulnerability affecting WebRTC Media Servers
https://www.rtcsec.com/article/novel-dos-vulnerability-affecting-webrtc-media-servers
UAC-0184 Abuses Python in DLL Sideloading for XWORM Distribution
https://cyble.com/blog/uac-0184-abuses-python-in-dll-sideloading-for-xworm-distribution/
Next.js and cache poisoning: a quest for the black hole
https://zhero-web-sec.github.io/research-and-things/nextjs-and-cache-poisoning-a-quest-for-the-black-hole
ThunderKitty: Open source stealer written in Go, all logs will be sent to Telegram bot
https://github.com/EvilBytecode/ThunderKitty
CVE-2024-30088 Windows Kernel Elevation of Privilege
https://github.com/tykawaii98/CVE-2024-30088
This repo contains all types of pdf exploits
https://github.com/coffinxp/pdFExploits
ExCobalt: GoRed, the hidden-tunnel technique
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/excobalt-gored-the-hidden-tunnel-technique