#tools #Fuzzing #Red_Team_Tactics
1. REcollapse - tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
https://github.com/0xacb/recollapse
2. Lateral Movement With Havoc C2 and Microsoft EDR
https://assume-breach.medium.com/home-grown-red-team-lateral-movement-with-havoc-c2-and-microsoft-edr-300b7389b1f7
1. REcollapse - tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications
https://github.com/0xacb/recollapse
2. Lateral Movement With Havoc C2 and Microsoft EDR
https://assume-breach.medium.com/home-grown-red-team-lateral-movement-with-havoc-c2-and-microsoft-edr-300b7389b1f7
GitHub
GitHub - 0xacb/recollapse: REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations…
REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications - 0xacb/recollapse
antimalware_scan_interface_bypasses_det.pdf
721.4 KB
#Red_Team_Tactics
"Antimalware Scan Interface Bypasses: Evading Detection to Perform Post Exploitation Activities", 2022.
"Antimalware Scan Interface Bypasses: Evading Detection to Perform Post Exploitation Activities", 2022.
FReD.pdf
288.3 KB
#Research
#Sec_code_review
"FRED: Identifying File Re-Delegation in Android System Services", 2022.
]-> Tool: https://github.com/wspr-ncsu/fred
#Sec_code_review
"FRED: Identifying File Re-Delegation in Android System Services", 2022.
]-> Tool: https://github.com/wspr-ncsu/fred
CVE-2020-1493.pdf
75.9 KB
#Whitepaper
1. MS Outlook 2019 16.0.13231 - RCE (CVE-2020-16947);
2. MS Outlook 2019 16.0.12624 - Out-Of-Bounds Read (CVE-2020-1493);
3. MS Outlook 2019 16.0.12624 - RCE (CVE-2020-1349).
1. MS Outlook 2019 16.0.13231 - RCE (CVE-2020-16947);
2. MS Outlook 2019 16.0.12624 - Out-Of-Bounds Read (CVE-2020-1493);
3. MS Outlook 2019 16.0.12624 - RCE (CVE-2020-1349).
WebView_sec.pdf
740.3 KB
#Threat_Research
"Identity Confusion in WebView-based Mobile App-in-app Ecosystems", 2022.
"Identity Confusion in WebView-based Mobile App-in-app Ecosystems", 2022.
RTFM_v2.epub
247.4 KB
#Tech_book
"Red Team Field Manual, Version 2.0", 2022.
"Red Team Field Manual, Version 2.0", 2022.
#tools
#Offensive_security
1. OFRAK (Open Firmware Reverse Analysis Konsole) - binary analysis and modification platform
https://github.com/redballoonsecurity/ofrak#getting-started
2. Wireguard-initramfs - dropbear over wireguard
https://github.com/r-pufky/wireguard-initramfs
3. A Python rewriting of PowerSploit's PowerView
https://github.com/the-useless-one/pywerview
#Offensive_security
1. OFRAK (Open Firmware Reverse Analysis Konsole) - binary analysis and modification platform
https://github.com/redballoonsecurity/ofrak#getting-started
2. Wireguard-initramfs - dropbear over wireguard
https://github.com/r-pufky/wireguard-initramfs
3. A Python rewriting of PowerSploit's PowerView
https://github.com/the-useless-one/pywerview
Translation: ru-en
Working in Spain #OSINT resources:
- https://librebor.me
- https://abctelefonos.com
- https://infocif.es
- https://infobel.com/es/spain
- https://paginasamarillas.es
- https://oscaro.es
- http://aire.org/rnac
- https://numeracionyoperadores.cnmc.es
- https://sedeapl.dgt.gob.es/WEB_TTRA_CONSULTA/Todos.faces
Working in Spain #OSINT resources:
- https://librebor.me
- https://abctelefonos.com
- https://infocif.es
- https://infobel.com/es/spain
- https://paginasamarillas.es
- https://oscaro.es
- http://aire.org/rnac
- https://numeracionyoperadores.cnmc.es
- https://sedeapl.dgt.gob.es/WEB_TTRA_CONSULTA/Todos.faces
Abctelefonos
AbcTelefonos.com - La guía que hace la gente
Información completa sobre personas, comercios, opiniones, personas vinculadas, datos comerciales y mucho más.
shootCutMe-main.zip
3.2 KB
ShootCutMe an .LNK file creator tool for redteamerShootCutMe an .LNK file creator tool for redteamer
👻1
Forwarded from 卩ro 爪Cracker
CVE-2022-38374.py
2.9 KB
💥CVE-2022-38374(XSS in Fortinet FortiADC 7.0.0 - 7.0.2 and 6.2.0 - 6.2.4) PoC exploit.
It allows an attacker to execute unauthorized code or commands via the URL and User fields observed in the traffic and event logviews
It allows an attacker to execute unauthorized code or commands via the URL and User fields observed in the traffic and event logviews
Forwarded from 卩ro 爪Cracker
shodanidb.zip
7.2 KB
⚙️shodanIDB is a command-line tool to fetch data (open ports, CVEs, CPEs, ...) from Shodan internetDB API.
⚠️NO API key required!
⚠️NO API key required!