๐ [ LLM Security @llm_sec ]
Remote Code Execution by Server-Side Template Injection in Model Metadata
CVSS 9.7 in llama_cpp_python
found by @retr0reg
๐ https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829
๐ฅ [ tweet ]
Remote Code Execution by Server-Side Template Injection in Model Metadata
CVSS 9.7 in llama_cpp_python
found by @retr0reg
๐ https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829
๐ฅ [ tweet ]
๐ฅ3๐1
๐ [ Nicolas Krassas @Dinosn ]
PoC for using MS Windows printers for persistence / command and control via Internet Printing
๐ https://github.com/Diverto/IPPrintC2
๐ฅ [ tweet ]
PoC for using MS Windows printers for persistence / command and control via Internet Printing
๐ https://github.com/Diverto/IPPrintC2
๐ฅ [ tweet ]
๐ฅ6๐2
๐ [ CravateRouge @rouge_cravate ]
Performing kerberos cross domain authentication with impacket is not straightforward!
If you want to authenticate on domain A (trusting domain B) with a userB you must ask a ST to domain B for krbtgt/domainA and then use this ST to request new ST to domainA, e.g.:
๐ฅ [ tweet ]
Performing kerberos cross domain authentication with impacket is not straightforward!
If you want to authenticate on domain A (trusting domain B) with a userB you must ask a ST to domain B for krbtgt/domainA and then use this ST to request new ST to domainA, e.g.:
๐ฅ [ tweet ]
ะ for ะะฐัะฝ๐ฅ5
๐ [ sinusoid @the_bit_diddler ]
I'm intending to release an open-source Visual Studio Code extension to make writing BOFs easier for the community:
- Complete Nt/Zw function prototypes with tab completion (and correct typecasting for placeholder variables)
- MSDN header searching
PoC:
๐ https://www.youtube.com/watch?v=oWss4Ac9Pl8
๐ฅ [ tweet ]
I'm intending to release an open-source Visual Studio Code extension to make writing BOFs easier for the community:
- Complete Nt/Zw function prototypes with tab completion (and correct typecasting for placeholder variables)
- MSDN header searching
PoC:
๐ https://www.youtube.com/watch?v=oWss4Ac9Pl8
๐ฅ [ tweet ]
๐ฅ3
๐ [ Steve S. @0xTriboulet ]
@vxunderground
BSides Talk on Writing malware in Nim w/o the Nim Runtime
๐ https://github.com/m4ul3r/writing_nimless/blob/main/Writing%20Nimless%20nim.pdf
๐ฅ [ tweet ]
@vxunderground
BSides Talk on Writing malware in Nim w/o the Nim Runtime
๐ https://github.com/m4ul3r/writing_nimless/blob/main/Writing%20Nimless%20nim.pdf
๐ฅ [ tweet ]
๐คฏ3๐ฅ2๐ค1
๐ [ CravateRouge @rouge_cravate ]
Having an AD with trusts you can reach?
bloodyAD can now retrieve the trusts of the trusts where you can connect to and print them as a nice ascii tree
๐ฅ [ tweet ]
Having an AD with trusts you can reach?
bloodyAD can now retrieve the trusts of the trusts where you can connect to and print them as a nice ascii tree
๐ฅ [ tweet ]
๐ฅ8
๐ [ Binni Shah @binitamshah ]
Hooking System Calls in Windows 11 22H2 like Avast Antivirus. Research, analysis and bypass : credits @Denis_Skvortcov
๐ https://the-deniss.github.io/posts/2022/12/08/hooking-system-calls-in-windows-11-22h2-like-avast-antivirus.html
๐ฅ [ tweet ]
Hooking System Calls in Windows 11 22H2 like Avast Antivirus. Research, analysis and bypass : credits @Denis_Skvortcov
๐ https://the-deniss.github.io/posts/2022/12/08/hooking-system-calls-in-windows-11-22h2-like-avast-antivirus.html
๐ฅ [ tweet ]
๐ฅ5๐1
๐ [ Jonny Johnson @jsecurity101 ]
Without further ado - here is EtwInspector!
This is a C++ tool to help users interact with ETW providers. This tool supports the enumeration of providers, their events, and capture events.
๐ https://github.com/jsecurity101/ETWInspector
๐ฅ [ tweet ][ quote ]
Without further ado - here is EtwInspector!
This is a C++ tool to help users interact with ETW providers. This tool supports the enumeration of providers, their events, and capture events.
๐ https://github.com/jsecurity101/ETWInspector
๐ฅ [ tweet ][ quote ]
๐5
๐ [ eversinc33 ๐ฉธ๐ก๏ธ @eversinc33 ]
If you are facing an EDR with PEB protection/obf which makes Ldr inaccessible & want to inject shellcode, just pass the VA of LoadLibrary (which is consistent across processes) to the shellcode via egg-hunting from your injector, enabling lib resolution without touching the PEB.
๐ฅ [ tweet ]
If you are facing an EDR with PEB protection/obf which makes Ldr inaccessible & want to inject shellcode, just pass the VA of LoadLibrary (which is consistent across processes) to the shellcode via egg-hunting from your injector, enabling lib resolution without touching the PEB.
๐ฅ [ tweet ]
*ัะผะตัะฝะพะน ััะฐั ะฒ ััะตะดะต*๐ฅ7๐1
๐ [ NCV @nickvourd ]
This is my first article! Special thanks to @LAripping and @S1ckB0y1337 for the inspiration!
๐ https://nickvourd.github.io/what-if-no-pkinit-still-the-same-fun/
๐ฅ [ tweet ]
#ะดะปั_ัะฐะผัั _ะผะฐะปะตะฝัะบะธั
This is my first article! Special thanks to @LAripping and @S1ckB0y1337 for the inspiration!
๐ https://nickvourd.github.io/what-if-no-pkinit-still-the-same-fun/
๐ฅ [ tweet ]
#ะดะปั_ัะฐะผัั _ะผะฐะปะตะฝัะบะธั
๐2
Offensive Xwitter
*ัะผะตัะฝะพะน ััะฐั ะฒ ััะตะดะต*
ะะฐะบ ัะบัะฐัะธัั ัะฒะพะน ะฒะตัะตั: ะธะดะตะผ ะฒ https://x.com/studentofthings, ะพัะบััะฒะฐะตะผ ะัะฒะตัั, ัะธัะฐะตะผ ััะตะดั, ัะพัะปะธััะตะผ.
๐ฅ4๐3๐ฅฑ2๐1
๐ [ VirusTotal @virustotal ]
"YARA is dead, long live YARA-X!" ๐
After 15 years, YARA gets a full rewrite in Rust, bringing enhanced performance, security, and user experience.
Dive into the details in latest blog post by @plusvic :
๐ https://blog.virustotal.com/2024/05/yara-is-dead-long-live-yara-x.html
๐ฅ [ tweet ]
"YARA is dead, long live YARA-X!" ๐
After 15 years, YARA gets a full rewrite in Rust, bringing enhanced performance, security, and user experience.
Dive into the details in latest blog post by @plusvic :
๐ https://blog.virustotal.com/2024/05/yara-is-dead-long-live-yara-x.html
๐ฅ [ tweet ]
๐ฅ8๐ค1๐ข1
๐ [ Thomas Rinsma @thomasrinsma ]
Just released the write-up for CVE-2024-4367, a bug I found recently in PDF.js (and hence in Firefox), resulting in arbitrary JavaScript execution when opening a malicious PDF.
๐ https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/
๐ฅ [ tweet ]
Just released the write-up for CVE-2024-4367, a bug I found recently in PDF.js (and hence in Firefox), resulting in arbitrary JavaScript execution when opening a malicious PDF.
๐ https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/
๐ฅ [ tweet ]
๐4
๐ [ Amal Murali @amalmurali47 ]
Just published a blog post on reversing the Git RCE: CVE-2024-32002. It includes my thought process, a working exploit for Mac and Windows, and the PoC GitHub repositories.
๐ https://amalmurali.me/posts/git-rce/
๐ฅ [ tweet ][ quote ]
Just published a blog post on reversing the Git RCE: CVE-2024-32002. It includes my thought process, a working exploit for Mac and Windows, and the PoC GitHub repositories.
๐ https://amalmurali.me/posts/git-rce/
๐ฅ [ tweet ][ quote ]
Forwarded from PT SWARM
๐งง Our researcher Igor Sak-Sakovskiy has discovered an XXE in Chrome and Safari by ChatGPT!
Bounty: $28,000 ๐ธ
Here is the write-up ๐ https://swarm.ptsecurity.com/xxe-chrome-safari-chatgpt/
Bounty: $28,000 ๐ธ
Here is the write-up ๐ https://swarm.ptsecurity.com/xxe-chrome-safari-chatgpt/
๐คฏ15๐4๐ฅฑ2๐ค1
๐ [ Lsec @lsecqt ]
I just uploaded a video where I weaponize the code from IconJector via process injection into more legit process than the exporer.exe itself. Hands down to this technique and all credit goes to its creator.
๐ https://www.youtube.com/watch?v=2agrRX4fD_I
๐ฅ [ tweet ]
I just uploaded a video where I weaponize the code from IconJector via process injection into more legit process than the exporer.exe itself. Hands down to this technique and all credit goes to its creator.
๐ https://www.youtube.com/watch?v=2agrRX4fD_I
๐ฅ [ tweet ]
๐3
๐ [ Ptrace Security GmbH @ptracesecurity ]
Nmap Dashboard with Grafana:
๐ https://hackertarget.com/nmap-dashboard-with-grafana/
๐ฅ [ tweet ]
Nmap Dashboard with Grafana:
๐ https://hackertarget.com/nmap-dashboard-with-grafana/
๐ฅ [ tweet ]
ะฟัะธะบะพะปัะฝะฐั ะธะดะตั๐12๐ค1
๐ [ es3n1n @es3n1n ]
i did a thing
๐ https://github.com/es3n1n/no-defender
๐ฅ [ tweet ]
i did a thing
๐ https://github.com/es3n1n/no-defender
๐ฅ [ tweet ]
ัะฒะตะถะฐะบ๐ฅ9
๐ [ Slowerzs @slowerzs ]
I wrote a blogpost on injecting code into a PPL process on Windows 11, without abusing any vulnerable driver.
๐ https://blog.slowerzs.net/posts/pplsystem/
๐ฅ [ tweet ]
I wrote a blogpost on injecting code into a PPL process on Windows 11, without abusing any vulnerable driver.
๐ https://blog.slowerzs.net/posts/pplsystem/
๐ฅ [ tweet ]
๐5๐ฅฑ1
๐ [ slonser @slonser_ ]
My new Research
Email attacks.
- C# 0day
- spoofing emails
e.t.c.
๐ https://blog.slonser.info/posts/email-attacks/
๐ฅ [ tweet ]
My new Research
Email attacks.
- C# 0day
- spoofing emails
e.t.c.
๐ https://blog.slonser.info/posts/email-attacks/
๐ฅ [ tweet ]
๐10๐ฅฑ2