Bypassing Windows Defender (10 Ways)
Link : https://www.fo-sec.com/articles/10-defender-bypass-methods
Link : https://www.fo-sec.com/articles/10-defender-bypass-methods
Analyzing an arm64 mach-O version of LockBit
Link : https://objective-see.org/blog/blog_0x75.html
Link : https://objective-see.org/blog/blog_0x75.html
IT Learning Collection
Mega : https://mega.nz/folder/1rBHzIyD#M-aTi-c1nC3OGNgpH8OqhA
Mega : https://mega.nz/folder/1rBHzIyD#M-aTi-c1nC3OGNgpH8OqhA
This media is not supported in your browser
VIEW IN TELEGRAM
MULTIPLE CRITICAL VULNERABILITIES IN STRAPI VERSIONS <= 4.7.1
Link : https://www.ghostccamm.com/blog/multi_strapi_vulns/
Link : https://www.ghostccamm.com/blog/multi_strapi_vulns/
CVE-2023-27350 : PaperCut - Deep Dive and Indicators of Compromise
Link : https://www.horizon3.ai/papercut-cve-2023-27350-deep-dive-and-indicators-of-compromise/
Link : https://www.horizon3.ai/papercut-cve-2023-27350-deep-dive-and-indicators-of-compromise/
CVE-2023-27524 : Apache Superset Insecure Default Configuration To Remote Code Execution
Blog : https://www.horizon3.ai/cve-2023-27524-insecure-default-configuration-in-apache-superset-leads-to-remote-code-execution/
Blog : https://www.horizon3.ai/cve-2023-27524-insecure-default-configuration-in-apache-superset-leads-to-remote-code-execution/
RASPBERRY ROBIN : ANTI-EVASION HOW-TO & EXPLOIT ANALYSIS
Link : https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/
Link : https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/
CVE-2023-29489 : Finding XSS in a million websites (cPanel -Reflected Cross-Site Scripting)
POC : https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/
Link : https://blog.assetnote.io/2023/04/26/cpanel-xss-advisory/
POC : https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/
Link : https://blog.assetnote.io/2023/04/26/cpanel-xss-advisory/
CVE-2023–23410 : Analysis and Summary of HTTP Elevation of Privilege Vulnerability
Link : https://medium.com/numen-cyber-labs/analysis-and-summary-of-cve-2023-23410-http-elevation-of-privilege-vulnerability-6893c3a44775
POC : https://github.com/numencyber/Vulnerability_PoC/blob/main/CVE-2023-23410
Link : https://medium.com/numen-cyber-labs/analysis-and-summary-of-cve-2023-23410-http-elevation-of-privilege-vulnerability-6893c3a44775
POC : https://github.com/numencyber/Vulnerability_PoC/blob/main/CVE-2023-23410
CVE-2023-28231 : DHCP Server Service Remote Code Execution
POC : https://github.com/numencyber/Vulnerability_PoC/blob/main/CVE-2023-28231/CVE-2023-28231-DHCP-VUL-PoC.cpp
POC : https://github.com/numencyber/Vulnerability_PoC/blob/main/CVE-2023-28231/CVE-2023-28231-DHCP-VUL-PoC.cpp
XSSI (Cross Site Script Inclusion) to Steal AccessToken and More
Link : https://github.com/AnkitCuriosity/Write-Ups/blob/main/XSSI%20(Cross%20Site%20Script%20Inclusion)%20to%20Steal%20AccessToken%20and%20More.md
Link : https://github.com/AnkitCuriosity/Write-Ups/blob/main/XSSI%20(Cross%20Site%20Script%20Inclusion)%20to%20Steal%20AccessToken%20and%20More.md
Apache Solr 8.3.1 RCE from exposed administration interface
Blog : https://blog.scrt.ch/2023/05/01/solr-rce-from-exposed-administration-interface/
POC : https://github.com/scrt/Apache-Solr-8.3.1-RCE
Blog : https://blog.scrt.ch/2023/05/01/solr-rce-from-exposed-administration-interface/
POC : https://github.com/scrt/Apache-Solr-8.3.1-RCE
Bypass IIS Authorisation with this One Weird Trick - Three RCEs and Two Auth Bypasses in Sitecore 9.3
Blog : https://blog.assetnote.io/2023/05/10/sitecore-round-two/
Blog : https://blog.assetnote.io/2023/05/10/sitecore-round-two/
CVE-2023-27363 : Foxit PDF Reader / Editor <= 12.1.1.15289 - 'exportXFAData Exposed Dangerous Method' - Remote Code Execution
POC : https://github.com/j00sean/SecBugs/tree/main/CVEs/CVE-2023-27363
XFA / PW : https://github.com/siberas/arpwn
Details : https://www.zerodayinitiative.com/advisories/ZDI-23-491/
POC : https://github.com/j00sean/SecBugs/tree/main/CVEs/CVE-2023-27363
XFA / PW : https://github.com/siberas/arpwn
Details : https://www.zerodayinitiative.com/advisories/ZDI-23-491/
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2023-1586 : Avast Anti-Virus privileged arbitrary file create on virus restore
Blog : https://the-deniss.github.io/posts/avast-privileged-arbitrary-file-create-on-restore/
POC : https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2023-1586/
Blog : https://the-deniss.github.io/posts/avast-privileged-arbitrary-file-create-on-restore/
POC : https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2023-1586/
Obfuscated SharpCollection
Repo : https://github.com/Flangvik/ObfuscatedSharpCollection
Repo : https://github.com/Flangvik/ObfuscatedSharpCollection
This media is not supported in your browser
VIEW IN TELEGRAM
Windows API Function Cheatsheets
Repo : https://github.com/snowcra5h/windows-api-function-cheatsheets
Repo : https://github.com/snowcra5h/windows-api-function-cheatsheets
Hardcore RCE via directory name for $3.000
Link : https://medium.com/@levshmelevv/hardcore-rce-via-directory-name-for-3-000-225ed58b41a9
Link : https://medium.com/@levshmelevv/hardcore-rce-via-directory-name-for-3-000-225ed58b41a9
CVE-2023-25690 : Apache HTTP Server 2.4.0 > 2.4.55 / 56 - HTTP Request Smuggling
Post/More : https://t.me/MrVGunz/762
Lab/PoC : https://github.com/dhmosfunk/CVE-2023-25690-POC
Post/More : https://t.me/MrVGunz/762
Lab/PoC : https://github.com/dhmosfunk/CVE-2023-25690-POC