Linux, Material de hacking y noticias
@Linux_and_hacking_material
1.5K
subscribers
246
photos
28
videos
3.36K
files
9.66K
links
Canal destinado a diversos contenidos: material de Linux, hacking y seguridad informática
Download Telegram
Join
Linux, Material de hacking y noticias
1.5K subscribers
Linux, Material de hacking y noticias
https://mega.nz/folder/7c0UGQAR#EIx_PCbO_G7X2m8eCxCOKA
mega.nz
File folder on MEGA
Linux, Material de hacking y noticias
https://m.youtube.com/watch?v=DNPjBvZxE3E&feature=share
YouTube
x86 NASM Assembly Crash Course
Recorded and edited by the UMBC IEEE Branch.
Website: https://www.umbc.edu/ieee/
Email: ieee-student-org@umbc.edu
Linux, Material de hacking y noticias
TP-Link’s Archer C5v Improper Authorization
https://gokay.org/tp-links-archer-c5v-improper-authorization/
Linux, Material de hacking y noticias
https://www.bleepingcomputer.com/news/security/trickbots-bazarbackdoor-malware-is-now-coded-in-nim-to-evade-antivirus/
BleepingComputer
TrickBot's BazarBackdoor malware is now coded in Nim to evade antivirus
TrickBot's stealthy BazarBackdoor malware has been rewritten in the Nim programming language, likely to evade detection by security software.
Linux, Material de hacking y noticias
https://medium.com/@markmotig/bypass-av-edr-with-safe-mode-975aacecc809
Medium
Bypass AV/EDR with Safe Mode?
Guess what might not be running in safe mode? An AV/EDR. Also, attackers do NOT need to be physically in front of the machine to run in…
Linux, Material de hacking y noticias
https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass
www.ired.team
Dumping Lsass without Mimikatz with MiniDumpWriteDump | Red Team Notes
Evasion, Credential Dumping
Linux, Material de hacking y noticias
https://www.kitploit.com/2021/01/opencve-cve-alerting-platform.html?m=1
KitPloit - PenTest & Hacking Tools
OpenCVE - CVE Alerting Platform
Linux, Material de hacking y noticias
https://securityonline.info/sharprelay-allows-for-user-mode-packet-interception-and-modification/
Penetration Testing
SharpRelay: allows for user-mode packet interception and modification
SharpRelay is based on the WinDivert driver. WinDivert is a kernel driver that allows for user-mode packet interception and modification
Linux, Material de hacking y noticias
https://github.com/loseys/BlackMamba?s=04
GitHub
loseys/BlackMamba
C2/post-exploitation framework. Contribute to loseys/BlackMamba development by creating an account on GitHub.
Linux, Material de hacking y noticias
https://github.com/BloodHoundAD/BloodHound/releases/tag/4.0.2
GitHub
Release BloodHound 4.0.2 · BloodHoundAD/BloodHound
This release comes with a whole heap of bugfixes.
Big thanks to everyone who submitted PRs and fixes (@cnotin @jtothef @nheineger @Scoubi)
Linux, Material de hacking y noticias
https://github.com/loseys/BlackMamba
GitHub
GitHub - loseys/BlackMamba: C2/post-exploitation framework
C2/post-exploitation framework. Contribute to loseys/BlackMamba development by creating an account on GitHub.
Linux, Material de hacking y noticias
fw extraction to rce
https://pwner.fun/2021/02/16/firmware-extraction-rce.html
pwn stories
firmware extraction to rce
fw extraction to rce
Linux, Material de hacking y noticias
http://www.brendangregg.com/Perf/linux_perf_tools_full.png
Linux, Material de hacking y noticias
https://nasbench.medium.com/finding-forensic-goodness-in-obscure-windows-event-logs-60e978ea45a3
Medium
Finding Forensic Goodness In Obscure Windows Event Logs
Digital Forensics and Threat Hunting for Artifacts In Obscure Windows Event Logs
Linux, Material de hacking y noticias
https://adepts.of0x.cc/alternatives-copy-shellcode/
One thousand and one ways to copy your shellcode to memory (VBA Macros) |
One thousand and one ways to copy your shellcode to memory (VBA Macros) | AdeptsOf0xCC
Alternative ways to copy your shellcode to memory in your VBA macros
Linux, Material de hacking y noticias
http://ropgadget.com/posts/abusing_win_functions.html
Linux, Material de hacking y noticias
https://www.archcloudlabs.com/projects/tracking-crypto-miners-in-the-homelab-2-new-tricks/
Archcloudlabs
Tracking Cryptocurrency Malware In The Homelab - Pt 2
About The Project Continuing from the last blog post that discussed malicious Linux Cryptocurrency miners, I have discovered new activity that blends two of my previous Cryptocurrency mining malware (aka Cryptojacking) blog posts.
By taking a deeper look…
Linux, Material de hacking y noticias
https://csandker.io/2021/02/21/Offensive-Windows-IPC-2-RPC.html
Linux, Material de hacking y noticias
https://itm4n.github.io/windows-registry-rpceptmapper-exploit/
itm4n’s blog
An Unconventional Exploit for the RpcEptMapper Registry Key Vulnerability
A few days ago, I released Perfusion, an exploit tool for the RpcEptMapper registry key vulnerability that I discussed in my previous post. Here, I want to discuss the strategy I opted for when I developed the exploit. Although it is not as technical as a…
Linux, Material de hacking y noticias
https://github.com/iamthefrogy/frogy