#Offensive_security
1. Spice up your persistence: loading PHP extensions from memory
https://adepts.of0x.cc/dlopen-from-memory-php
2. Unholy Unhooking
byoDLL: https://steve-s.gitbook.io/0xtriboulet/unholy-unhooking/unholy-unhooking-byodll
FrByoDLL: https://steve-s.gitbook.io/0xtriboulet/unholy-unhooking/unholy-unhooking-frbyodll
1. Spice up your persistence: loading PHP extensions from memory
https://adepts.of0x.cc/dlopen-from-memory-php
2. Unholy Unhooking
byoDLL: https://steve-s.gitbook.io/0xtriboulet/unholy-unhooking/unholy-unhooking-byodll
FrByoDLL: https://steve-s.gitbook.io/0xtriboulet/unholy-unhooking/unholy-unhooking-frbyodll
Spice up your persistence: loading PHP extensions from memory |
Spice up your persistence: loading PHP extensions from memory | AdeptsOf0xCC
Load shared object (PHP extension) from memory
#Tech_book
#Hardware_Security
"A Noob's Guide To ARM Exploitation", 2022.
https://ad2001.gitbook.io/a-noobs-guide-to-arm-exploitation
#Hardware_Security
"A Noob's Guide To ARM Exploitation", 2022.
https://ad2001.gitbook.io/a-noobs-guide-to-arm-exploitation
ad2001.gitbook.io
About the book | A Noob's Guide To ARM Exploitation
#Malware_analysis
1. GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection
https://gbhackers.com/guloader-malware-advanced-anti-analysis
2. CatB Ransomware
https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection
1. GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection
https://gbhackers.com/guloader-malware-advanced-anti-analysis
2. CatB Ransomware
https://minerva-labs.com/blog/new-catb-ransomware-employs-2-year-old-dll-hijacking-technique-to-evade-detection
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection
An advanced malware downloader named GuLoader has recently been exposed by cybersecurity researchers at CrowdStrike. This advanced downloader has the capability to evade the detection of security software by adopting a variety of techniques.
#Threat_Research
APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector
https://thehackernews.com/2022/12/apt-hackers-turn-to-malicious-excel-add.html
APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector
https://thehackernews.com/2022/12/apt-hackers-turn-to-malicious-excel-add.html
#reversing
1. Reverse Engineering Rustlang Binaries - A Series
https://brightprogrammer.netlify.app/post/reverse-engineering-rustlang-binaries-0x1-empty-program
2. Huawei's Security Hypervisor
https://blog.impalabs.com/2212_huawei-security-hypervisor.html
1. Reverse Engineering Rustlang Binaries - A Series
https://brightprogrammer.netlify.app/post/reverse-engineering-rustlang-binaries-0x1-empty-program
2. Huawei's Security Hypervisor
https://blog.impalabs.com/2212_huawei-security-hypervisor.html
BrightProgrammer
Reverse Engineering Rustlang Binaries - A Series | BrightProgrammer
I’ve been struggling with reverse engineering rustlang binaries for a while in CTF challenges. So I’m starting a reverse engineering series where I reverse engineer several rustlang binariesa and try to understand how they actually work.
#Offensive_security
1. Custom Implicit & Explicit Conversions in C#
https://offensivedefence.co.uk/posts/implicit-explicit-conversions
2. .NET Process injection in a new process with QueueUserAPC using D/invoke
https://gist.github.com/tothi/9cdd2be3b49cb42723726fd75df96471
3. Deceiving Defender: The Big Stack Bypass
https://steve-s.gitbook.io/0xtriboulet/deceiving-defender/deceiving-defender-the-big-stack-bypass
1. Custom Implicit & Explicit Conversions in C#
https://offensivedefence.co.uk/posts/implicit-explicit-conversions
2. .NET Process injection in a new process with QueueUserAPC using D/invoke
https://gist.github.com/tothi/9cdd2be3b49cb42723726fd75df96471
3. Deceiving Defender: The Big Stack Bypass
https://steve-s.gitbook.io/0xtriboulet/deceiving-defender/deceiving-defender-the-big-stack-bypass
offensivedefence.co.uk
Custom Implicit & Explicit Conversions in C#
Implicit and explicited operators are provided as a means of converting one datatype to another.
// this is an implicit conversion from an int to a double int i = 8; double d = i; // this is an explicit conversion from a double to an int double d = 8.8; int…
// this is an implicit conversion from an int to a double int i = 8; double d = i; // this is an explicit conversion from a double to an int double d = 8.8; int…
#hardening
Windows 10 Hardening (v.0.9.0) settings and configurations
https://github.com/0x6d69636b/windows_hardening
Windows 10 Hardening (v.0.9.0) settings and configurations
https://github.com/0x6d69636b/windows_hardening
GitHub
GitHub - 0x6d69636b/windows_hardening: HardeningKitty and Windows Hardening Settings
HardeningKitty and Windows Hardening Settings. Contribute to 0x6d69636b/windows_hardening development by creating an account on GitHub.
🧰RedTeam-Tools is github repository contains a collection of tools and resources that can be useful for red teaming activities.
⚙️Reconnaissance
⚙️Resource Development
⚙️Initial Access
⚙️Execution
⚙️Persistence
⚙️Privilege Escalation
⚙️Defense Evasion
⚙️Credential Access
⚙️Discovery
⚙️Lateral Movement
⚙️Collection
⚙️C&C
⚙️Exfiltration
⚙️Impact
⚙️Reconnaissance
⚙️Resource Development
⚙️Initial Access
⚙️Execution
⚙️Persistence
⚙️Privilege Escalation
⚙️Defense Evasion
⚙️Credential Access
⚙️Discovery
⚙️Lateral Movement
⚙️Collection
⚙️C&C
⚙️Exfiltration
⚙️Impact
Dynamic Routing Security.pdf
1.5 MB
Мой диплом по безопасности динамической маршрутизации, который я защитил на отлично в этом году (заканчивал я значит колледж)
Пользуйтесь на здоровье
Пользуйтесь на здоровье
EarSpy – A New Attack on Android Devices Use Motion Sensors to Steal Sensitive Data
https://gbhackers.com/earspy-android/
https://gbhackers.com/earspy-android/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
EarSpy - A New Attack on Android Devices Use Motion Sensors to Steal Sensitive Data
There has been a new eavesdropping attack developed by a team of security experts for Android devices which has been dubbed "EarSpy." With the help of this attack, attackers can detect the following things:-
Welcoming Our Forum »» https://system32.ink
ASK: Anything Related To Tech With Create your Own forum
Learn: About Programming,cybersecurity,bugHunting And Many More
Post: Share your Knowledge,Rats,Databases And Videos related to Tech
So SignUp Now And Grow Our Community
Thank You;
ASK: Anything Related To Tech With Create your Own forum
Learn: About Programming,cybersecurity,bugHunting And Many More
Post: Share your Knowledge,Rats,Databases And Videos related to Tech
So SignUp Now And Grow Our Community
Thank You;
🔥2
#tools
#Blue_Team_Techniques
1. HTML Smuggling Detection - HTML Smuggling Detection
https://micahbabinski.medium.com/html-smuggling-detection-5adefebb6841
2. Log4Shell-Scanner-Exploit - Bash script to identify the Log4j CVE-2021-44228 vulnerability remotely
https://github.com/julian911015/Log4j-Scanner-Exploit
#Blue_Team_Techniques
1. HTML Smuggling Detection - HTML Smuggling Detection
https://micahbabinski.medium.com/html-smuggling-detection-5adefebb6841
2. Log4Shell-Scanner-Exploit - Bash script to identify the Log4j CVE-2021-44228 vulnerability remotely
https://github.com/julian911015/Log4j-Scanner-Exploit
Medium
HTML Smuggling Detection
Introduction
#Threat_Research
CVE-2022-27510, CVE-2022-27518 - Measuring Citrix ADC & Gateway version adoption on the Internet
https://blog.fox-it.com/2022/12/28/cve-2022-27510-cve-2022-27518-measuring-citrix-adc-gateway-version-adoption-on-the-internet
CVE-2022-27510, CVE-2022-27518 - Measuring Citrix ADC & Gateway version adoption on the Internet
https://blog.fox-it.com/2022/12/28/cve-2022-27510-cve-2022-27518-measuring-citrix-adc-gateway-version-adoption-on-the-internet
Fox-IT International blog
CVE-2022-27510, CVE-2022-27518 – Measuring Citrix ADC & Gateway version adoption on the Internet
Authored by Yun Zheng Hu Recently, two critical vulnerabilities were reported in Citrix ADC and Citrix Gateway; where one of them was being exploited in the wild by a threat actor. Due to these vul…
#Analytics
#Sec_code_review
Top 10 bugs found in C++ projects in 2022
https://pvs-studio.com/en/blog/posts/cpp/1021
#Sec_code_review
Top 10 bugs found in C++ projects in 2022
https://pvs-studio.com/en/blog/posts/cpp/1021
PVS-Studio
Top 10 bugs found in C++ projects in 2022
New Year is coming! It means, according to tradition, it′s time to recall 10 of the most interesting warnings that PVS-Studio found during 2022.