ExcreamOnSecurity
411 subscribers
505 links
root@ExcreamOnSecurity: % cat ~/etc/topics.allow

- Offensive Security (Red Teaming / PenTesting)
- BlueTeam (OperationSec, TreatHunting, DFIR)
- Reverse Engineering / Malware Analisys
- Web Security
Download Telegram
Command and Control via TCP Handshake

This is my first blog post, so please let me know if there’s any way I can improve this post. I expect it to have inaccuracies and maybe have parts that can be explained better. Would appreciate a quick note if any of you notice them! So, all that BS aside, let’s get into it.

https://thesw4rm.gitlab.io/nfqueue_c2/2019/09/15/Command-and-Control-via-TCP-Handshake/

#c2 #linux #NFQueue
(AB)USING LINUX SNMP FOR RCE

If you have a SNMP community with write permissions on a Linux target, you can get code execution by abusing the NET-SNMP-EXTEND-MIB extension. The SNMP daemon is running as root, making this also a nice local privilege escalation vector.

https://mogwailabs.de/blog/2019/10/abusing-linux-snmp-for-rce/
#linux #snmp #rce #pentesting
tinyssh

TinySSH is a minimalistic SSH server which implements only a subset of SSHv2 features.
https://tinyssh.org/

#tools #ssh #linux
Vegile - Ghost In The Shell

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

https://github.com/Screetsec/Vegile
#linux #postexploitation #persistence #evasion
Nightmare

Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges. I call it that because it's a lot of people's nightmare to get hit by weaponized 0 days, which these skills directly translate into doing that type of work (plus it's a really cool song).

https://guyinatuxedo.github.io/
#linux #learning #pwn #exploitation #shellcoding
collection of verified Linux kernel exploits

lpe is based on the tool out-of-tree (documentation) and allows collaborative work on Linux kernel exploits without too much complexity.

https://github.com/jollheef/lpe
#tools #linux #privesc
DEFEATING STACK CANARY, PIE AND DEP ON REMOTE 64 BIT SERVER WITH BYTE WISE BRUTEFORCE

https://www.ret2rop.com/2020/05/canary-pie-byte-bruteforce.html
#linux #exploitation #pwn
The art of gaining root

This is my First blog about Linux Privilege escalation. So Without wasting any time Let’s Start I’ll start with basics.

https://mystiko.sh/?p=699
#linux #exploitation #oscp