Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฑ #ChatGPT Goes Mobile: #OpenAI Expands Accessibility with Phone and #WhatsApp Integration
https://undercodenews.com/chatgpt-goes-mobile-openai-expands-accessibility-with-phone-and-whatsapp-integration/
@Undercode_News
https://undercodenews.com/chatgpt-goes-mobile-openai-expands-accessibility-with-phone-and-whatsapp-integration/
@Undercode_News
UNDERCODE NEWS
ChatGPT Goes Mobile: OpenAI Expands Accessibility with Phone and WhatsApp Integration - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆChatgpt Hack:
Official Repo of ChatGPT "DAN" (and other "Jailbreaks"):
https://github.com/0xk1h0/ChatGPT_DAN
Official Repo of ChatGPT "DAN" (and other "Jailbreaks"):
https://github.com/0xk1h0/ChatGPT_DAN
GitHub
GitHub - 0xk1h0/ChatGPT_DAN: ChatGPT DAN, Jailbreaks prompt
ChatGPT DAN, Jailbreaks prompt. Contribute to 0xk1h0/ChatGPT_DAN development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฎ #Windows 11 24H2: A Buggy #Update for Gamers
https://undercodenews.com/windows-11-24h2-a-buggy-update-for-gamers/
@Undercode_News
https://undercodenews.com/windows-11-24h2-a-buggy-update-for-gamers/
@Undercode_News
UNDERCODE NEWS
Windows 11 24H2: A Buggy Update for Gamers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Apache Struts Flaw Under Active Attack: Urgent Patching Needed
https://undercodenews.com/apache-struts-flaw-under-active-attack-urgent-patching-needed/
@Undercode_News
https://undercodenews.com/apache-struts-flaw-under-active-attack-urgent-patching-needed/
@Undercode_News
UNDERCODE NEWS
Apache Struts Flaw Under Active Attack: Urgent Patching Needed - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Russia's Undesirable Label: A Badge of Honor for Recorded Future
https://undercodenews.com/russias-undesirable-label-a-badge-of-honor-for-recorded-future/
@Undercode_News
https://undercodenews.com/russias-undesirable-label-a-badge-of-honor-for-recorded-future/
@Undercode_News
UNDERCODE NEWS
Russia's Undesirable Label: A Badge of Honor for Recorded Future - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Hunters #Ransomware Targets Microvision
https://undercodenews.com/hunters-ransomware-targets-microvision/
@Undercode_News
https://undercodenews.com/hunters-ransomware-targets-microvision/
@Undercode_News
UNDERCODE NEWS
Hunters Ransomware Targets Microvision - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Hunters #Ransomware Targets Trev Deeley Motorcycles, Another Victim Falls Prey
https://undercodenews.com/hunters-ransomware-targets-trev-deeley-motorcycles-another-victim-falls-prey/
@Undercode_News
https://undercodenews.com/hunters-ransomware-targets-trev-deeley-motorcycles-another-victim-falls-prey/
@Undercode_News
UNDERCODE NEWS
Hunters Ransomware Targets Trev Deeley Motorcycles, Another Victim Falls Prey - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ก๏ธ Pushing the Boundaries: Fitness, Fire Safety, and Life Support Advancements on the International Space Station
https://undercodenews.com/pushing-the-boundaries-fitness-fire-safety-and-life-support-advancements-on-the-international-space-station/
@Undercode_News
https://undercodenews.com/pushing-the-boundaries-fitness-fire-safety-and-life-support-advancements-on-the-international-space-station/
@Undercode_News
UNDERCODE NEWS
Pushing the Boundaries: Fitness, Fire Safety, and Life Support Advancements on the International Space Station - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆWhat is Honeypot: Simplified
Follow Santosh Nandakumar for daily simplified infosec learnings.
A honeypot is a security mechanism designed to detect, deflect, or study hacking attempts by acting as a decoy system. It looks like a legitimate target but is isolated from the actual network to gather intelligence on attackers.
Example
Imagine youโre protecting a house (your network) from burglars. You set up a fake house nearby, filled with dummy valuables. Burglars are attracted to this fake house, thinking itโs the real one. You monitor their actions to learn their techniques and better secure your actual house.
Technical Example
You deploy a honeypot server within your corporate network that mimics a database server. It contains no real data but appears authentic to attackers. When an attacker tries to access it, their activities (such as IP, methods, and tools) are logged for analysis.
Types of Honeypots
1. Production Honeypot
Used to improve overall security by distracting attackers from real systems.
Example: A fake customer login page for a banking website.
2. Research Honeypot
Used for studying attack methods and gathering intelligence.
Example: A honeypot server that simulates IoT devices to study botnet attacks.
Usage
- Intrusion Detection: Identify unauthorized access attempts.
- Threat Intelligence: Understand attackers' tools, techniques, and goals.
- Deception Strategy: Divert attackers away from real resources.
- Vulnerability Testing: Study how attackers exploit weaknesses.
Benefits
1. Early Threat Detection: Identifies threats before they reach critical systems.
2. Data Collection: Offers valuable insights into attack patterns and behaviors.
3. Improved Defense: Helps in identifying security gaps and improving defenses.
4. Resource Efficiency: Reduces the workload on actual systems by diverting attacks.
5. Training Ground: Useful for security teams to practice handling real-world threats.
Limitations
1. Limited Scope: Cannot detect attacks on systems outside the honeypot.
2. Risk of Exploitation: If not properly isolated, attackers could use the honeypot to attack real systems.
3. Resource Intensive: Requires setup, monitoring, and maintenance.
Ref: Santosh Nandakumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Follow Santosh Nandakumar for daily simplified infosec learnings.
A honeypot is a security mechanism designed to detect, deflect, or study hacking attempts by acting as a decoy system. It looks like a legitimate target but is isolated from the actual network to gather intelligence on attackers.
Example
Imagine youโre protecting a house (your network) from burglars. You set up a fake house nearby, filled with dummy valuables. Burglars are attracted to this fake house, thinking itโs the real one. You monitor their actions to learn their techniques and better secure your actual house.
Technical Example
You deploy a honeypot server within your corporate network that mimics a database server. It contains no real data but appears authentic to attackers. When an attacker tries to access it, their activities (such as IP, methods, and tools) are logged for analysis.
Types of Honeypots
1. Production Honeypot
Used to improve overall security by distracting attackers from real systems.
Example: A fake customer login page for a banking website.
2. Research Honeypot
Used for studying attack methods and gathering intelligence.
Example: A honeypot server that simulates IoT devices to study botnet attacks.
Usage
- Intrusion Detection: Identify unauthorized access attempts.
- Threat Intelligence: Understand attackers' tools, techniques, and goals.
- Deception Strategy: Divert attackers away from real resources.
- Vulnerability Testing: Study how attackers exploit weaknesses.
Benefits
1. Early Threat Detection: Identifies threats before they reach critical systems.
2. Data Collection: Offers valuable insights into attack patterns and behaviors.
3. Improved Defense: Helps in identifying security gaps and improving defenses.
4. Resource Efficiency: Reduces the workload on actual systems by diverting attacks.
5. Training Ground: Useful for security teams to practice handling real-world threats.
Limitations
1. Limited Scope: Cannot detect attacks on systems outside the honeypot.
2. Risk of Exploitation: If not properly isolated, attackers could use the honeypot to attack real systems.
3. Resource Intensive: Requires setup, monitoring, and maintenance.
Ref: Santosh Nandakumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Your #Instagram Profile: A #Digital Business Card
https://undercodenews.com/your-instagram-profile-a-digital-business-card/
@Undercode_News
https://undercodenews.com/your-instagram-profile-a-digital-business-card/
@Undercode_News
UNDERCODE NEWS
Your Instagram Profile: A Digital Business Card - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Interpol Calls for a More Humane Term for Romance Scams
https://undercodenews.com/interpol-calls-for-a-more-humane-term-for-romance-scams/
@Undercode_News
https://undercodenews.com/interpol-calls-for-a-more-humane-term-for-romance-scams/
@Undercode_News
UNDERCODE NEWS
Interpol Calls for a More Humane Term for Romance Scams - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆAI-SOC. Radiant Security AI.
I have had many conversations (and still have) about Security for AI, especially about how AI-SOC can affect and help the SOC team and processes. At the same time, We have been (xTriage) running Radiant Security AI as AI-SOC (and more) for over a year, and the results arrived on time with HUGH successes!
During the AI-SOC journey with Radiant Security AI, we found many advantages about it. Below are some of them (in a nutshell):
1๏ธโฃ Proactive Threat Hunting: AI-SOC leverages real-time data analysis and threat intelligence to proactively detect emerging threats, even before they appear in known threat databases.
2๏ธโฃ Precision in Incident Detection: AI models analyze massive datasets and correlate events across multiple layers (network, endpoints, cloud, identities), reducing detection blind spots.
3๏ธโฃ Scalability: AI-SOC can handle the massive influx of security alerts and scale effortlessly with an organization's growth without requiring linear increases in human resources.
4๏ธโฃ Behavioral Anomaly Detection: AI identifies subtle deviations from normal behavior patterns that traditional systems often overlook, ensuring early detection of insider threats and zero-day exploits.
5๏ธโฃ Hyperautomation: Combining AI with SOAR platforms enables faster and smarter incident response. Automated workflows triage and contain incidents without waiting for human intervention.
6๏ธโฃ Continuous Learning and Adaptation: AI algorithms evolve with each new threat encountered, continuously improving their accuracy and relevance in detecting sophisticated attacks.
7๏ธโฃ Enhanced Collaboration: AI-SOC tools facilitate collaboration across security tiers (T1-T3), presenting data and insights in clear, actionable formats tailored to the expertise level of the analyst.
8๏ธโฃ Integrated Multi-Vendor Ecosystem: With support for seamless integration into existing ecosystems (e.g., XDR tools, SIEMs, SOAR), AI-SOC ensures minimal workflow disruption.
9๏ธโฃ Reduction in False Positives: By understanding context and correlating events, AI dramatically reduces false positives, allowing analysts to focus on genuine threats.
๐ Cost Efficiency: By automating repetitive tasks and reducing the need for manual intervention, AI-SOC optimizes resource utilization and lowers the overall cost of operations.
In the end, T1/T2 is not chasing after massive FPs or useless alerts - They are now doing advanced tasks.
Ref: Elli Shlomo
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
I have had many conversations (and still have) about Security for AI, especially about how AI-SOC can affect and help the SOC team and processes. At the same time, We have been (xTriage) running Radiant Security AI as AI-SOC (and more) for over a year, and the results arrived on time with HUGH successes!
During the AI-SOC journey with Radiant Security AI, we found many advantages about it. Below are some of them (in a nutshell):
1๏ธโฃ Proactive Threat Hunting: AI-SOC leverages real-time data analysis and threat intelligence to proactively detect emerging threats, even before they appear in known threat databases.
2๏ธโฃ Precision in Incident Detection: AI models analyze massive datasets and correlate events across multiple layers (network, endpoints, cloud, identities), reducing detection blind spots.
3๏ธโฃ Scalability: AI-SOC can handle the massive influx of security alerts and scale effortlessly with an organization's growth without requiring linear increases in human resources.
4๏ธโฃ Behavioral Anomaly Detection: AI identifies subtle deviations from normal behavior patterns that traditional systems often overlook, ensuring early detection of insider threats and zero-day exploits.
5๏ธโฃ Hyperautomation: Combining AI with SOAR platforms enables faster and smarter incident response. Automated workflows triage and contain incidents without waiting for human intervention.
6๏ธโฃ Continuous Learning and Adaptation: AI algorithms evolve with each new threat encountered, continuously improving their accuracy and relevance in detecting sophisticated attacks.
7๏ธโฃ Enhanced Collaboration: AI-SOC tools facilitate collaboration across security tiers (T1-T3), presenting data and insights in clear, actionable formats tailored to the expertise level of the analyst.
8๏ธโฃ Integrated Multi-Vendor Ecosystem: With support for seamless integration into existing ecosystems (e.g., XDR tools, SIEMs, SOAR), AI-SOC ensures minimal workflow disruption.
9๏ธโฃ Reduction in False Positives: By understanding context and correlating events, AI dramatically reduces false positives, allowing analysts to focus on genuine threats.
๐ Cost Efficiency: By automating repetitive tasks and reducing the need for manual intervention, AI-SOC optimizes resource utilization and lowers the overall cost of operations.
In the end, T1/T2 is not chasing after massive FPs or useless alerts - They are now doing advanced tasks.
Ref: Elli Shlomo
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#TikTok's Fate in the Hands of Supreme Court: A Ban or a Reprieve?
https://undercodenews.com/tiktoks-fate-in-the-hands-of-supreme-court-a-ban-or-a-reprieve/
@Undercode_News
https://undercodenews.com/tiktoks-fate-in-the-hands-of-supreme-court-a-ban-or-a-reprieve/
@Undercode_News
UNDERCODE NEWS
TikTok's Fate in the Hands of Supreme Court: A Ban or a Reprieve? - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from DailyCVE
๐ openCart, Server-Side Template Injection (SSTI), GHSA-xrh7-2gfq-4rcq (Moderate)
https://dailycve.com/opencart-server-side-template-injection-ssti-ghsa-xrh7-2gfq-4rcq-moderate/
@DailyCVE
https://dailycve.com/opencart-server-side-template-injection-ssti-ghsa-xrh7-2gfq-4rcq-moderate/
@DailyCVE
DailyCVE
openCart, Server-Side Template Injection (SSTI), GHSA-xrh7-2gfq-4rcq (Moderate) - DailyCVE
2024-12-19 : This advisory, originally published on the GitHub Advisory Database, has been withdrawn due to being a duplicate of [โฆ]
Forwarded from DailyCVE
๐ด golangorg/x/net/#html: Non-linear Parsing Vulnerability (#CVE-TBD) - Critical
https://dailycve.com/golangorg-x-net-html-non-linear-parsing-vulnerability-cve-tbd-critical/
@Daily_CVE
https://dailycve.com/golangorg-x-net-html-non-linear-parsing-vulnerability-cve-tbd-critical/
@Daily_CVE
DailyCVE
golangorg/x/net/html: Non-linear Parsing Vulnerability (CVE-TBD) - Critical - DailyCVE
2024-12-19 What Undercode Says: A critical vulnerability (CVE-TBD) has been identified in the golang.org/x/net/html package. An attacker can exploit this [โฆ]
Forwarded from UNDERCODE NEWS (UNDERCODER)
Whatsapp (Meta) server is down
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆAnother Red Team Pack:
๐๐๐ ๐๐๐๐ฆ ๐๐จ๐จ๐ฅ๐ฌ ๐ฅ
๐ด RECONNAISSANCE:
- RustScan ==> https://lnkd.in/ebvRfBNy
- NmapAutomator ==> https://lnkd.in/gu5wxzf6
- AutoRecon ==> https://lnkd.in/g3DeG6YT
- Amass ==> https://lnkd.in/e7V569N5
- CloudEnum ==> https://lnkd.in/ePHDeGZv
- Recon-NG ==> https://lnkd.in/edwaXFjS
- AttackSurfaceMapper ==> https://lnkd.in/ebbcj6Rm
- DNSDumpster ==> https://dnsdumpster.com/
๐ด INITIAL ACCESS:
- SprayingToolKit ==> https://lnkd.in/eBSAPz5z
- o365Recon ==> https://lnkd.in/eJwCx-Ga
- Psudohash ==> https://lnkd.in/gcaxV6fR
- CredMaster ==> https://lnkd.in/gtMEDVuS
- DomainPasswordSpray ==> https://lnkd.in/guWj4TYv
- TheSprayer ==> https://lnkd.in/gZVuQYiv
- TREVORspray ==> https://lnkd.in/gHgcbjgV
๐ด DELIVERY:
- o365AttackToolKit ==> https://lnkd.in/etCCYi8y
- EvilGinx2 ==> https://lnkd.in/eRDPvwUg
- GoPhish ==> https://lnkd.in/ea26dfNg
- PwnAuth ==> https://lnkd.in/eqecM7de
- Modlishka ==> https://lnkd.in/eds-dR5C
๐ด COMMAND AND CONTROL:
- PoshC2 ==> https://lnkd.in/eqSJUDji
- Sliver ==> https://lnkd.in/ewN9Nday
- SILENTTRINITY ==> https://lnkd.in/eeZGbYMs
- Empire ==> https://lnkd.in/egAPa8gY
- AzureC2Relay ==> https://lnkd.in/efmh2t3g
- Havoc C2 ==> https://lnkd.in/gEFp2iym
- Mythic C2 ==> https://lnkd.in/gnCGwfWk
๐ด CREDENTIAL DUMPING:
- MimiKatz ==> https://lnkd.in/etEGfvJK
- HekaTomb ==> https://lnkd.in/eJx5Ugu5
- SharpLAPS ==> https://lnkd.in/eA28n9FT
- Net-GPPPassword ==> https://lnkd.in/e3CTez5A
- PyPyKatz ==> https://lnkd.in/eeb5b6Tz
๐ด PRIVILEGE ESCALATION:
- SharpUp ==> https://lnkd.in/etR2Pe_n
- MultiPotato ==> https://lnkd.in/eq53PXcJ
- PEASS ==> https://lnkd.in/eWA66akh
- Watson ==> https://lnkd.in/eZfYMSMX
- Bat-Potato ==> https://lnkd.in/gjziyG8q
๐ด DEFENSE EVASION:
- Villain ==> https://lnkd.in/gquyGFm5
- EDRSandBlast ==> https://lnkd.in/e8g8zYFT
- SPAWN - Cobalt Strike BOF ==> https://lnkd.in/e223PbqZ
- NetLoader ==> https://lnkd.in/ef5wCD4y
- KillDefenderBOF ==> https://lnkd.in/eVd54HUp
- ThreatCheck ==> https://lnkd.in/eHvSPakR
- Freeze ==> https://lnkd.in/eNUh3zCi
- GadgetToJScript ==> https://lnkd.in/egPQBBXJ
๐ด PERSISTENCE:
- SharPyShell ==> https://lnkd.in/eXm8h8Bj
- SharpStay ==> https://lnkd.in/erRbeFMj
- SharpEventPersist ==> https://lnkd.in/e_kJFNiB
๐ด LATERAL MOVEMENT:
- SCShell ==> https://lnkd.in/e256fC8B
- MoveKit ==> https://lnkd.in/eR-NUu_U
- ImPacket ==> https://lnkd.in/euG4hTTs
๐ด EXFILTRATION:
- SharpExfiltrate ==> https://lnkd.in/eGC4BKRN
- DNSExfiltrator ==> https://lnkd.in/epJ-s6gp
- Egress-Assess ==> https://lnkd.in/eXGFPQRJ
Ref: Adnan Alam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐๐๐ ๐๐๐๐ฆ ๐๐จ๐จ๐ฅ๐ฌ ๐ฅ
๐ด RECONNAISSANCE:
- RustScan ==> https://lnkd.in/ebvRfBNy
- NmapAutomator ==> https://lnkd.in/gu5wxzf6
- AutoRecon ==> https://lnkd.in/g3DeG6YT
- Amass ==> https://lnkd.in/e7V569N5
- CloudEnum ==> https://lnkd.in/ePHDeGZv
- Recon-NG ==> https://lnkd.in/edwaXFjS
- AttackSurfaceMapper ==> https://lnkd.in/ebbcj6Rm
- DNSDumpster ==> https://dnsdumpster.com/
๐ด INITIAL ACCESS:
- SprayingToolKit ==> https://lnkd.in/eBSAPz5z
- o365Recon ==> https://lnkd.in/eJwCx-Ga
- Psudohash ==> https://lnkd.in/gcaxV6fR
- CredMaster ==> https://lnkd.in/gtMEDVuS
- DomainPasswordSpray ==> https://lnkd.in/guWj4TYv
- TheSprayer ==> https://lnkd.in/gZVuQYiv
- TREVORspray ==> https://lnkd.in/gHgcbjgV
๐ด DELIVERY:
- o365AttackToolKit ==> https://lnkd.in/etCCYi8y
- EvilGinx2 ==> https://lnkd.in/eRDPvwUg
- GoPhish ==> https://lnkd.in/ea26dfNg
- PwnAuth ==> https://lnkd.in/eqecM7de
- Modlishka ==> https://lnkd.in/eds-dR5C
๐ด COMMAND AND CONTROL:
- PoshC2 ==> https://lnkd.in/eqSJUDji
- Sliver ==> https://lnkd.in/ewN9Nday
- SILENTTRINITY ==> https://lnkd.in/eeZGbYMs
- Empire ==> https://lnkd.in/egAPa8gY
- AzureC2Relay ==> https://lnkd.in/efmh2t3g
- Havoc C2 ==> https://lnkd.in/gEFp2iym
- Mythic C2 ==> https://lnkd.in/gnCGwfWk
๐ด CREDENTIAL DUMPING:
- MimiKatz ==> https://lnkd.in/etEGfvJK
- HekaTomb ==> https://lnkd.in/eJx5Ugu5
- SharpLAPS ==> https://lnkd.in/eA28n9FT
- Net-GPPPassword ==> https://lnkd.in/e3CTez5A
- PyPyKatz ==> https://lnkd.in/eeb5b6Tz
๐ด PRIVILEGE ESCALATION:
- SharpUp ==> https://lnkd.in/etR2Pe_n
- MultiPotato ==> https://lnkd.in/eq53PXcJ
- PEASS ==> https://lnkd.in/eWA66akh
- Watson ==> https://lnkd.in/eZfYMSMX
- Bat-Potato ==> https://lnkd.in/gjziyG8q
๐ด DEFENSE EVASION:
- Villain ==> https://lnkd.in/gquyGFm5
- EDRSandBlast ==> https://lnkd.in/e8g8zYFT
- SPAWN - Cobalt Strike BOF ==> https://lnkd.in/e223PbqZ
- NetLoader ==> https://lnkd.in/ef5wCD4y
- KillDefenderBOF ==> https://lnkd.in/eVd54HUp
- ThreatCheck ==> https://lnkd.in/eHvSPakR
- Freeze ==> https://lnkd.in/eNUh3zCi
- GadgetToJScript ==> https://lnkd.in/egPQBBXJ
๐ด PERSISTENCE:
- SharPyShell ==> https://lnkd.in/eXm8h8Bj
- SharpStay ==> https://lnkd.in/erRbeFMj
- SharpEventPersist ==> https://lnkd.in/e_kJFNiB
๐ด LATERAL MOVEMENT:
- SCShell ==> https://lnkd.in/e256fC8B
- MoveKit ==> https://lnkd.in/eR-NUu_U
- ImPacket ==> https://lnkd.in/euG4hTTs
๐ด EXFILTRATION:
- SharpExfiltrate ==> https://lnkd.in/eGC4BKRN
- DNSExfiltrator ==> https://lnkd.in/epJ-s6gp
- Egress-Assess ==> https://lnkd.in/eXGFPQRJ
Ref: Adnan Alam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn