Forwarded from Adaptix Framework
Куда идти дальше TG бота? Наверное в Android клиент😂
https://github.com/BlackSnufkin/GeckoDroid
А если серьезно, круто развивается проект)
https://github.com/BlackSnufkin/GeckoDroid
А если серьезно, круто развивается проект)
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Крутая работа!
https://maorsabag.github.io/posts/adaptix-stealthpalace/sleeping-beauty/
Если ты не вникал в блог Crystal Palace, но планировал, то данный ресерч просто must have для понимания, как можно использовать этот проект за рамками Cobalt Strike.
#evasion #redteam #pentest #dev
https://maorsabag.github.io/posts/adaptix-stealthpalace/sleeping-beauty/
Если ты не вникал в блог Crystal Palace, но планировал, то данный ресерч просто must have для понимания, как можно использовать этот проект за рамками Cobalt Strike.
#evasion #redteam #pentest #dev
MaorSabag's Blog
Sleeping Beauty: Putting Adaptix to Bed with Crystal Palace
A tale of relocations, ROP chains, and the quest to make an Adaptix beacon sleep gracefully.
Ghaleb Al-otaibi
Stealthy WMI lateral movement - StealthyWMIExec.py
Stealthy WMI lateral movement - StealthyWMIExec.py Recently, I started reading wmiexec.py to learn how to write WMI with Impacket scripts. however, I saw how easy it was to detect WMIExec, because WMIexec uses the Win32_Process class and also uses the Create…
Forwarded from Ralf Hacker Channel (Ralf Hacker)
CVE-2026-24291: Windows LPE (RegPwn)
Exploit: https://github.com/mdsecactivebreach/RegPwn
Blog: https://www.mdsec.co.uk/2026/03/rip-regpwn/
BOF: https://github.com/Flangvik/RegPwnBOF
Patched: Mar 10, 2026
#lpe #pentest #redteam #ad #cve
Exploit: https://github.com/mdsecactivebreach/RegPwn
Blog: https://www.mdsec.co.uk/2026/03/rip-regpwn/
BOF: https://github.com/Flangvik/RegPwnBOF
Tested versions:
Windows 11 25h2
Windows 11 24h2
Windows 10 21h2
Windows Servers 2016/2019/2022
Patched: Mar 10, 2026
#lpe #pentest #redteam #ad #cve
GitHub
GitHub - mdsecactivebreach/RegPwn
Contribute to mdsecactivebreach/RegPwn development by creating an account on GitHub.
Forwarded from APT
EventLogin — CVE-2025-29969
A flaw in the MS-EVEN protocol. Low-privileged users can write arbitrary files to a remote machine, effectively bypassing the need for an administrator account for remote file writes
🔗 Source:
https://github.com/SafeBreach-Labs/EventLogin-CVE-2025-29969
🔗 Research:
https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/
#ad #windows #eventlog #rpc
A flaw in the MS-EVEN protocol. Low-privileged users can write arbitrary files to a remote machine, effectively bypassing the need for an administrator account for remote file writes
🔗 Source:
https://github.com/SafeBreach-Labs/EventLogin-CVE-2025-29969
🔗 Research:
https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/
#ad #windows #eventlog #rpc