Forwarded from Pentester Resources (TRÄW🤟)
Advanced Windows exploit development resources
00 - Windows Rootkits
01 - Windows kernel mitigations
02 - Windows kernel shellcode
03 - Windows kernel exploitation
04 -Windows kernel GDI exploitation
05 - Windows kernel Win32k.sys research
06 - Windows Kernel logic bugs
07 - Windows kernel driver development
08 - Windows internals
09 - Advanced Windows debugging
10 - 0days - APT advanced malware research
11 - Video game cheating (kernel mode stuff sometimes)
12 - Hyper-V and VM / sandbox escape
13 - Fuzzing
14 - Windows browser exploitation
15 - books, certifications and courses
https://github.com/FULLSHADE/WindowsExploitationResources
00 - Windows Rootkits
01 - Windows kernel mitigations
02 - Windows kernel shellcode
03 - Windows kernel exploitation
04 -Windows kernel GDI exploitation
05 - Windows kernel Win32k.sys research
06 - Windows Kernel logic bugs
07 - Windows kernel driver development
08 - Windows internals
09 - Advanced Windows debugging
10 - 0days - APT advanced malware research
11 - Video game cheating (kernel mode stuff sometimes)
12 - Hyper-V and VM / sandbox escape
13 - Fuzzing
14 - Windows browser exploitation
15 - books, certifications and courses
https://github.com/FULLSHADE/WindowsExploitationResources
GitHub
GitHub - FULLSHADE/WindowsExploitationResources: Resources for Windows exploit development
Resources for Windows exploit development. Contribute to FULLSHADE/WindowsExploitationResources development by creating an account on GitHub.
Lista Blanca: Qué es y Cómo Implementarla en Ciberseguridad
https://esgeeks.com/que-es-lista-blanca/?feed_id=12841&_unique_id=6244dfb056968
https://esgeeks.com/que-es-lista-blanca/?feed_id=12841&_unique_id=6244dfb056968
EsGeeks
Lista Blanca: Qué es y Cómo Implementarla en Ciberseguridad » EsGeeks
La lista blanca o de permisos es fundamental para la ciberseguridad. Descubre qué implica la "whitelist" (allowlist) y cómo implementarla.
#Springshell: un nuevo 0-day que golpea el core de Spring https://www.hackplayers.com/2022/03/springshell-rce-core-spring.html
Hackplayers
#Springshell: un nuevo 0-day que golpea el core de Spring
Recientemente, un miembro del grupo KnownSec con nick p1n93r publicó un pantallazo en su cuenta de Twitter que mostraba un RCE explotado tri...
SteaLinG: Framework de Pentesting para Ingeniería Social
https://esgeeks.com/stealing-pentesting-ingenieria-social/?feed_id=12874&_unique_id=62461997d3624
https://esgeeks.com/stealing-pentesting-ingenieria-social/?feed_id=12874&_unique_id=62461997d3624
EsGeeks
SteaLinG: Framework de Pentesting para Ingeniería Social » EsGeeks
SteaLinG es un framework de pruebas de penetración de código abierto diseñado para la ingeniería social (social engineering).
Escuchas telefónicas
Las escuchas telefónicas son un procedimiento habitual de vigilancia por parte de policías y Estados. Conoce cómo funcionan, qué métodos no sirven para detectarlas y qué podemos hacer para enfrentar los ataques a dispositivos móviles:
https://colectivodisonancia.net/escuchas-telefonicas
Las escuchas telefónicas son un procedimiento habitual de vigilancia por parte de policías y Estados. Conoce cómo funcionan, qué métodos no sirven para detectarlas y qué podemos hacer para enfrentar los ataques a dispositivos móviles:
https://colectivodisonancia.net/escuchas-telefonicas
Nanobrok: Controlar y Proteger Dispositivo Android Remotamente
https://esgeeks.com/nanobrok-controlar-android-remotamente/?feed_id=12891&_unique_id=62474995d0a2e
https://esgeeks.com/nanobrok-controlar-android-remotamente/?feed_id=12891&_unique_id=62474995d0a2e
EsGeeks
Nanobrok: Controlar y Proteger Dispositivo Android Remotamente
Nanobrok es un servicio web, open source, escrito en Python para controlar y proteger tu dispositivo Android de forma remota.
1 - http://wiki.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project
2 - http://crackme.cenzic.com/kelev/view/home.php
3 - http://wiki.owasp.org/index.php/OWASP_Bricks
4 - http://owasp.org/www-project-juice-shop/
5 - http://owasp.org/www-project-webgoat/
6 - https://junior.stillhackinganyway.nl
7 - http://google-gruyere.appspot.com
8 - https://damnvulnerableiosapp.com/
9 - http://overthewire.org/wargames/
10 - https://academy.hackaflag.com.br
11 - http://ctf.infosecinstitute.com
12 - http://zero.webappsecurity.com
13 - https://atenea.ccn-cert.cni.es
14 - https://captf.com/practice-ctf
15 - https://www.hacksplaining.com
16 - https://warzone.elhacker.net
17 - https://www.hackthissite.org
18 - http://www.hackthissite.org
19 - http://xss-game.appspot.com
20 - https://www.hacking-lab.com
21 - https://defcon2018.ctfd.io
22 - https://attackdefense.com
23 - https://ctf.hacker101.com
24 - https://exploit.education
25 - https://immersivelabs.com
26 - https://www.hackthebox.eu
27 - http://ctf.komodosec.com
28 - http://freehackquest.com
29 - https://cmdchallenge.com
30 - http://ctf.hacklabme.me
31 - http://defendtheweb.net
32 - http://hackthissite.org
33 - https://ctf.hackucf.org
34 - https://labs.cydefe.com
35 - https://www.root-me.org
36 - https://www.vulnhub.com
37 - http://hacking-lab.com
38 - http://www.root-me.org
39 - https://cryptopals.com
40 - http://itsecgames.com
41 - https://hackthebox.eu
42 - https://tryhackme.com
43 - http://labs.gf0s.com
44 - https://ctflearn.com
45 - https://w3challs.com
46 - http://ctflearn.com
47 - http://reversing.kr
48 - http://w3challs.com
49 - https://365.csaw.io
50 - https://ctftime.org
51 - https://picoctf.com
52 - http://hackxor.net
53 - http://root-me.org
54 - http://vulnhub.com
55 - https://ctf365.com
56 - http://hax.tor.hu
57 - http://pwnable.tw
58 - https://hack.me
59 - http://hack.me
60 - http://hbh.sh
2 - http://crackme.cenzic.com/kelev/view/home.php
3 - http://wiki.owasp.org/index.php/OWASP_Bricks
4 - http://owasp.org/www-project-juice-shop/
5 - http://owasp.org/www-project-webgoat/
6 - https://junior.stillhackinganyway.nl
7 - http://google-gruyere.appspot.com
8 - https://damnvulnerableiosapp.com/
9 - http://overthewire.org/wargames/
10 - https://academy.hackaflag.com.br
11 - http://ctf.infosecinstitute.com
12 - http://zero.webappsecurity.com
13 - https://atenea.ccn-cert.cni.es
14 - https://captf.com/practice-ctf
15 - https://www.hacksplaining.com
16 - https://warzone.elhacker.net
17 - https://www.hackthissite.org
18 - http://www.hackthissite.org
19 - http://xss-game.appspot.com
20 - https://www.hacking-lab.com
21 - https://defcon2018.ctfd.io
22 - https://attackdefense.com
23 - https://ctf.hacker101.com
24 - https://exploit.education
25 - https://immersivelabs.com
26 - https://www.hackthebox.eu
27 - http://ctf.komodosec.com
28 - http://freehackquest.com
29 - https://cmdchallenge.com
30 - http://ctf.hacklabme.me
31 - http://defendtheweb.net
32 - http://hackthissite.org
33 - https://ctf.hackucf.org
34 - https://labs.cydefe.com
35 - https://www.root-me.org
36 - https://www.vulnhub.com
37 - http://hacking-lab.com
38 - http://www.root-me.org
39 - https://cryptopals.com
40 - http://itsecgames.com
41 - https://hackthebox.eu
42 - https://tryhackme.com
43 - http://labs.gf0s.com
44 - https://ctflearn.com
45 - https://w3challs.com
46 - http://ctflearn.com
47 - http://reversing.kr
48 - http://w3challs.com
49 - https://365.csaw.io
50 - https://ctftime.org
51 - https://picoctf.com
52 - http://hackxor.net
53 - http://root-me.org
54 - http://vulnhub.com
55 - https://ctf365.com
56 - http://hax.tor.hu
57 - http://pwnable.tw
58 - https://hack.me
59 - http://hack.me
60 - http://hbh.sh
owasp.org
OWASP Juice Shop | OWASP Foundation
Probably the most modern and sophisticated insecure web application for security trainings, awareness demos and CTFs. Also great voluntary guinea pig for your security tools and DevSecOps pipelines!
[remote] PostgreSQL 9.3-11.7 - Remote Code Execution (RCE) (Authenticated)
PostgreSQL 9.3-11.7 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50847
PostgreSQL 9.3-11.7 - Remote Code Execution (RCE) (Authenticated)
https://www.exploit-db.com/exploits/50847
Exploit Database
PostgreSQL 9.3-11.7 - Remote Code Execution (RCE) (Authenticated)
PostgreSQL 9.3-11.7 - Remote Code Execution (RCE) (Authenticated). CVE-2019–9193 . remote exploit for Multiple platform
rcX: Un Potente Generador de Shell Inversa
https://esgeeks.com/rcx-generador-shell-inversa/?feed_id=12905&_unique_id=6248979cdbebe
https://esgeeks.com/rcx-generador-shell-inversa/?feed_id=12905&_unique_id=6248979cdbebe
EsGeeks
rcX: Un Potente Generador de Shell Inversa » EsGeeks
El predecesor de rcX es rsGen (un generador de carga útil inversa). Actualmente, es un potente generador de shell inversa/vinculada.
Forwarded from ⿻Bla⃟ck0ut⃟⿻ | Canal de Hacking Ético (🔙)
VMSA-2022-0010
CVSSv3 Range: 9.8
Issue Date: 2022-04-02
Updated On: 2022-04-02 (Initial Advisory)
CVE(s): CVE-2022-22965
Synopsis:
VMware Response to Spring Framework Remote Code Execution Vulnerability, aka Spring4Shell (CVE-2022-22965)
Impacted Products
VMware Tanzu Application Service for VMs
VMware Tanzu Operations Manager
VMware Tanzu Kubernetes Grid Integrated Edition (TKGI)
https://www.vmware.com/security/advisories/VMSA-2022-0010.html
CVSSv3 Range: 9.8
Issue Date: 2022-04-02
Updated On: 2022-04-02 (Initial Advisory)
CVE(s): CVE-2022-22965
Synopsis:
VMware Response to Spring Framework Remote Code Execution Vulnerability, aka Spring4Shell (CVE-2022-22965)
Impacted Products
VMware Tanzu Application Service for VMs
VMware Tanzu Operations Manager
VMware Tanzu Kubernetes Grid Integrated Edition (TKGI)
https://www.vmware.com/security/advisories/VMSA-2022-0010.html