#Malware_analysis
1. Munin - Online hash checker for Virustotal and other services
https://github.com/Neo23x0/munin
2. Hunting for Attestation Signed Malware
https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware
1. Munin - Online hash checker for Virustotal and other services
https://github.com/Neo23x0/munin
2. Hunting for Attestation Signed Malware
https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware
#tools
#OSINT
OctoSuite - A framework fro gathering OSINT on GitHub users, repositories and organizations
https://github.com/bellingcat/octosuite
#OSINT
OctoSuite - A framework fro gathering OSINT on GitHub users, repositories and organizations
https://github.com/bellingcat/octosuite
Hardware_Trojans.pdf
4.3 MB
#Hardware_Security
"Security Closure of IC Layouts Against Hardware Trojans", 2022.
]-> Repo: https://drive.google.com/drive/u/0/mobile/folders/1A_Cy6w2n31_wuPKVayz50R-1lfXfC4vH?usp=sharing
]-> OMLA attack: https://github.com/DfX-NYUAD/OMLA
]-> MuxLink attack: https://github.com/lilasrahis/MuxLink
"Security Closure of IC Layouts Against Hardware Trojans", 2022.
]-> Repo: https://drive.google.com/drive/u/0/mobile/folders/1A_Cy6w2n31_wuPKVayz50R-1lfXfC4vH?usp=sharing
]-> OMLA attack: https://github.com/DfX-NYUAD/OMLA
]-> MuxLink attack: https://github.com/lilasrahis/MuxLink
#tools
#Offensive_security
1. Venom - library that meant to perform evasive communication using stolen browser socket
https://github.com/Idov31/Venom
2. Pingoor - Linux Backdoor based on ICMP protocol
https://github.com/MrEmpy/Pingoor
#Offensive_security
1. Venom - library that meant to perform evasive communication using stolen browser socket
https://github.com/Idov31/Venom
2. Pingoor - Linux Backdoor based on ICMP protocol
https://github.com/MrEmpy/Pingoor
#exploit
CVE-2022-42823:
1. Apple Safari JavaScriptCore Inspector Type Confusion
https://ssd-disclosure.com/apple-safari-javascriptcore-inspector-type-confusion
2. CVE-2021-22015:
VMware vCenter vScalation Privilege Escalation
https://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html
CVE-2022-42823:
1. Apple Safari JavaScriptCore Inspector Type Confusion
https://ssd-disclosure.com/apple-safari-javascriptcore-inspector-type-confusion
2. CVE-2021-22015:
VMware vCenter vScalation Privilege Escalation
https://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html
💥Ban-R
•Features:
~Reports Time Delay To Secure Your Acc
~Temp Ban & Permanent Ban
~Fully Safe & Accessible
~Works Without Proxies
~Anti Virtual Machine
•Use 2013 Insta Accounts For Fast Banning
Download Link: Click Here 👈
Password: #CyberRatsBanR
By Cyber_Rats ❤️
•Features:
~Reports Time Delay To Secure Your Acc
~Temp Ban & Permanent Ban
~Fully Safe & Accessible
~Works Without Proxies
~Anti Virtual Machine
•Use 2013 Insta Accounts For Fast Banning
Download Link: Click Here 👈
Password: #CyberRatsBanR
By Cyber_Rats ❤️
BlueTeam.Lab
This project contains a set of Terraform and Ansible scripts to create an orchestrated BlueTeam Lab.
The goal of this project is to provide the red and blue teams with the ability to deploy an ad-hoc detection lab to test various attacks and forensic artifacts on the latest Windows environment and then to get a 'SOC-like' view into generated data.
https://github.com/op7ic/BlueTeam.Lab
#blueteam #techniques #cybersecurity #infosec
This project contains a set of Terraform and Ansible scripts to create an orchestrated BlueTeam Lab.
The goal of this project is to provide the red and blue teams with the ability to deploy an ad-hoc detection lab to test various attacks and forensic artifacts on the latest Windows environment and then to get a 'SOC-like' view into generated data.
https://github.com/op7ic/BlueTeam.Lab
#blueteam #techniques #cybersecurity #infosec
wanderer.zip
279.5 KB
🔥Wanderer is an open-source program that collects information about running processes. This information includes the integrity level, the presence of the AMSI as a loaded module, whether it is running as 64-bit or 32-bit as well as the privilege level of the current process.
This information is extremely helpful when building payloads catered to the ideal candidate for process injection.
This information is extremely helpful when building payloads catered to the ideal candidate for process injection.
|Offensive Security Cheatsheet|
Document used to centralize many informations about cybersecurity techniques and payloads.
💾OSINT
💾Web Pentest
💾Network
💾Shells methods
💾Windows Systems
💾Linux Systems
💾Other Systems
💾Passcracking Hash & Files
💾Phishing, RedTeam and SE
💾Wireless
💾Cryptography
💾Pwn
💾Defensive, Monitoring, CTI...
💾External Resources
Document used to centralize many informations about cybersecurity techniques and payloads.
💾OSINT
💾Web Pentest
💾Network
💾Shells methods
💾Windows Systems
💾Linux Systems
💾Other Systems
💾Passcracking Hash & Files
💾Phishing, RedTeam and SE
💾Wireless
💾Cryptography
💾Pwn
💾Defensive, Monitoring, CTI...
💾External Resources
🔥🔥🔥MeshyJSON: A TP-Link tdpServer JSON Stack Overflow
This blog post describes a vulnerability found and exploited in November 2022 by NCC Group. The target was the TP-Link AX1800 WiFi 6 Router (Archer AX21). It was running hardware version 3.6 and firmware version 1.1.1 (Archer AX21(US)_V3.6_1.1.1 Build 20220603). The vulnerability was patched on 2nd of December 2022 with firmware version 1.1.3 (Archer AX21(US)_V3.6_1.1.3 Build 20221125).
This blog post describes a vulnerability found and exploited in November 2022 by NCC Group. The target was the TP-Link AX1800 WiFi 6 Router (Archer AX21). It was running hardware version 3.6 and firmware version 1.1.1 (Archer AX21(US)_V3.6_1.1.1 Build 20220603). The vulnerability was patched on 2nd of December 2022 with firmware version 1.1.3 (Archer AX21(US)_V3.6_1.1.3 Build 20221125).
|Exploit Notes|
📑Exploit Notes github repo
Sticky notes for pentesting. Search hacking techniques and tools for penetration testings, bug bounty, CTF.
💾File Upload Attack
💾Java Pentesting
💾RE with Rizin
💾Android Pentesting
💾Pug Pentesting
💾PE Analysis
💾RE
💾IMINT and GEOINT
💾32-bit ARM Assembly
💾OSINT
💾x86 Assembly
💾Malware Analysis
💾BOF Attack
📑Exploit Notes github repo
Sticky notes for pentesting. Search hacking techniques and tools for penetration testings, bug bounty, CTF.
💾File Upload Attack
💾Java Pentesting
💾RE with Rizin
💾Android Pentesting
💾Pug Pentesting
💾PE Analysis
💾RE
💾IMINT and GEOINT
💾32-bit ARM Assembly
💾OSINT
💾x86 Assembly
💾Malware Analysis
💾BOF Attack
#Threat_Research
EntryBleed: Breaking KASLR under KPTI with Prefetch (CVE-2022-4543)
https://www.willsroot.io/2022/12/entrybleed.html
]-> https://seclists.org/oss-sec/2022/q4/198
EntryBleed: Breaking KASLR under KPTI with Prefetch (CVE-2022-4543)
https://www.willsroot.io/2022/12/entrybleed.html
]-> https://seclists.org/oss-sec/2022/q4/198
www.willsroot.io
EntryBleed: Breaking KASLR under KPTI with Prefetch (CVE-2022-4543)
Vulnerability Research on Low-Level Systems
Wi-Fi Surveyor
Visualize Wi-Fi signal strength over a geographic area.
https://github.com/ecoAPM/WiFiSurveyor
Visualize Wi-Fi signal strength over a geographic area.
https://github.com/ecoAPM/WiFiSurveyor
GitHub
GitHub - ecoAPM/WiFiSurveyor: Visualize Wi-Fi signal strength over a geographic area
Visualize Wi-Fi signal strength over a geographic area - ecoAPM/WiFiSurveyor