hacker_trick | Неотсортированное

Telegram-канал hacker_trick - Hacker tricks

3151

CVEs🔰 Tools🛠 RedTeam📕

Подписаться на канал

Hacker tricks

ItsNotASecurityBoundary: is an exploit that leverages False File Immutability assumptions in Windows Code Integrity (ci.dll) to trick it into accepting an improperly-signed security catalog containing fraudulent authentihashes
https://github.com/gabriellandau/ItsNotASecurityBoundary

Читать полностью…

Hacker tricks

CVE-2024-34102: Unauthenticated Magento XXE
https://github.com/th3gokul/CVE-2024-34102

Читать полностью…

Hacker tricks

Ransomware written in go, encrypt - decrypt
https://github.com/EvilBytecode/ThunderKitty-Ransomware
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, VM Detect package
https://github.com/EvilBytecode/PyDefender

Читать полностью…

Hacker tricks

Escaping the Sandbox On Windows - HITB x PHDays 2024
https://github.com/edwardzpeng/presentations/tree/main/HITB%20x%20PHDays%202024

Читать полностью…

Hacker tricks

Putting the C2 in C2loudflare
https://labs.jumpsec.com/putting-the-c2-in-c2loudflare

Читать полностью…

Hacker tricks

Polyfill supply chain attack hits 100K+ sites
https://sansec.io/research/polyfill-supply-chain-attack

Читать полностью…

Hacker tricks

PoC and Exploit for CVE-2024-29943
A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE
https://github.com/bjrjk/CVE-2024-29943

Читать полностью…

Hacker tricks

rust toolchain with obfuscation llvm pass
https://github.com/0xlane/ollvm-rust

Читать полностью…

Hacker tricks

AWS “Segmentation Test” Methodology for Pentesters
alt3kx/my-aws-segmentation-test-methodology-for-pentesters-v1-0-bc110753c1e9" rel="nofollow">https://medium.com/@alt3kx/my-aws-segmentation-test-methodology-for-pentesters-v1-0-bc110753c1e9

Читать полностью…

Hacker tricks

MSC Dropper is a Python script designed to automate the creation of MSC (Microsoft Management Console) files with customizable payloads for arbitrary execution
https://github.com/ZERODETECTION/MSC_Dropper

Читать полностью…

Hacker tricks

Cybersecurity in the SMB space — a growing threat
https://securelist.com/smb-threat-report-2024

Читать полностью…

Hacker tricks

RemoteKrbRelay: Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework
https://github.com/CICADA8-Research/RemoteKrbRelay

Читать полностью…

Hacker tricks

IOCTL Code Decoder
https://github.com/idkhidden/ioctl-decoder

Читать полностью…

Hacker tricks

This is a simple proof-of-concept project demonstrating how you can hide memory regions of your process from other processes
https://github.com/SamuelTulach/MemoryGuard

Читать полностью…

Hacker tricks

Part 8: Reverse Shell Via Dll Hijacking
https://sid4hack.medium.com/malware-development-part-8-reverse-shell-via-dll-hijacking-ce48f5ebbafe

Читать полностью…

Hacker tricks

ApexLdr: is a DLL Payload Loader written in C
https://github.com/Cipher7/ApexLdr

Читать полностью…

Hacker tricks

Sinon: Modular Windows Burn-In Automation with Generative AI for Deception
https://github.com/referefref/sinon

Читать полностью…

Hacker tricks

SharpIncrease can bypass many security measures and can be used with various file extensions
https://github.com/mertdas/SharpIncrease

Читать полностью…

Hacker tricks

An AWS Administrator Identity Crisis: Part 1
https://posts.specterops.io/an-aws-administrator-identity-crisis-part-1-919e6171ec0a

Читать полностью…

Hacker tricks

Attacks Against Linux SSH Services
https://asec.ahnlab.com/en/66695
Attackers Exploiting Public Cobalt Strike Profiles
https://unit42.paloaltonetworks.com/attackers-exploit-public-cobalt-strike-profiles

Читать полностью…

Hacker tricks

OTP Bypass through Session Manipulation
n4if/otp-bypass-through-session-manipulation-d73deceaa42f" rel="nofollow">https://medium.com/@n4if/otp-bypass-through-session-manipulation-d73deceaa42f

Читать полностью…

Hacker tricks

Binary Golf 5 - Linux shellcoding ideas
https://github.com/yo-yo-yo-jbo/bggp5_linux_shellcode

Читать полностью…

Hacker tricks

Find Sensitive Data’s using via network analysis
test123cybertest/find-sensitive-datas-using-via-network-analysis-make-me-250-a0b23b0cb03b" rel="nofollow">https://medium.com/@test123cybertest/find-sensitive-datas-using-via-network-analysis-make-me-250-a0b23b0cb03b

Читать полностью…

Hacker tricks

A Novel DoS Vulnerability affecting WebRTC Media Servers
https://www.rtcsec.com/article/novel-dos-vulnerability-affecting-webrtc-media-servers

Читать полностью…

Hacker tricks

UAC-0184 Abuses Python in DLL Sideloading for XWORM Distribution
https://cyble.com/blog/uac-0184-abuses-python-in-dll-sideloading-for-xworm-distribution/

Читать полностью…

Hacker tricks

Next.js and cache poisoning: a quest for the black hole
https://zhero-web-sec.github.io/research-and-things/nextjs-and-cache-poisoning-a-quest-for-the-black-hole

Читать полностью…

Hacker tricks

ThunderKitty: Open source stealer written in Go, all logs will be sent to Telegram bot
https://github.com/EvilBytecode/ThunderKitty

Читать полностью…

Hacker tricks

CVE-2024-30088 Windows Kernel Elevation of Privilege
https://github.com/tykawaii98/CVE-2024-30088

Читать полностью…

Hacker tricks

This repo contains all types of pdf exploits
https://github.com/coffinxp/pdFExploits

Читать полностью…

Hacker tricks

ExCobalt: GoRed, the hidden-tunnel technique
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/excobalt-gored-the-hidden-tunnel-technique

Читать полностью…
Подписаться на канал