■■□□□ PrivFu: Kernel mode WinDbg extension and PoCs for token privilege investigation.
https://github.com/daem0nc0re/PrivFu
https://github.com/daem0nc0re/PrivFu
GitHub
GitHub - daem0nc0re/PrivFu: Kernel mode WinDbg extension and PoCs for token privilege investigation.
Kernel mode WinDbg extension and PoCs for token privilege investigation. - daem0nc0re/PrivFu
■■■□□ CVE-2022-0847 eBPF: An eBPF program to detect and defense attacks on CVE-2022-0847 (DirtyPipe).
https://github.com/h4ckm310n/CVE-2022-0847-eBPF
https://github.com/h4ckm310n/CVE-2022-0847-eBPF
GitHub
GitHub - h4ckm310n/CVE-2022-0847-eBPF: An eBPF program to detect attacks on CVE-2022-0847
An eBPF program to detect attacks on CVE-2022-0847 - h4ckm310n/CVE-2022-0847-eBPF
■■□□□ LdrLibraryEx: A small x64 library to load dll's into memory.
https://github.com/Cracked5pider/LdrLibraryEx
https://github.com/Cracked5pider/LdrLibraryEx
GitHub
GitHub - Cracked5pider/LdrLibraryEx: A small x64 library to load dll's into memory.
A small x64 library to load dll's into memory. Contribute to Cracked5pider/LdrLibraryEx development by creating an account on GitHub.
Forwarded from cKure Red
GCR - Google Calendar RAT
Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure. To use GRC, only a Gmail account is required. The script creates a 'Covert Channel' by exploiting the event descriptions in Google Calendar. The target will connect directly to Google." It could be considered as a layer 7 application Covert Channel (but some friends would say it cannot be :) very thanks to my mates "Tortellini" https://aptw.tf)
https://github.com/MrSaighnal/GCR-Google-Calendar-RAT
Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure. To use GRC, only a Gmail account is required. The script creates a 'Covert Channel' by exploiting the event descriptions in Google Calendar. The target will connect directly to Google." It could be considered as a layer 7 application Covert Channel (but some friends would say it cannot be :) very thanks to my mates "Tortellini" https://aptw.tf)
https://github.com/MrSaighnal/GCR-Google-Calendar-RAT
cKure Red
GCR - Google Calendar RAT Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure. To use GRC, only a Gmail…
■■■□□ Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel.
https://thehackernews.com/2023/11/google-warns-of-hackers-absing-calendar.html
https://thehackernews.com/2023/11/google-warns-of-hackers-absing-calendar.html
■□□□□ CVE-2023-30190 (Folina) demo on windows office.
https://www.facebook.com/share/r/1sTsufbUiqV8Arvc/
https://www.facebook.com/share/r/1sTsufbUiqV8Arvc/
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
■□□□□ Cyber-Attack on Qatari Ecommerce Government by a group calling themselves 'Indian Cyber Force'. It was a DoS attack.
Target - https://ecommerce.gov.qa/
Check Host - https://check-host.net/check-report/130d6715kb0d
Duration: 2 hours (as per the group).
Target - https://ecommerce.gov.qa/
Check Host - https://check-host.net/check-report/130d6715kb0d
Duration: 2 hours (as per the group).
■■■■□ CVE-2023-22518: Improper Authorization Vulnerability in Confluence Data Center and Server.
A critical vulnerability in Atlassian Confluence Data Center and Server. The vulnerability could potentially allow unauthenticated attackers with network access to the Confluence Instance to restore the database of the Confluence instance and eventually execute arbitrary system commands.
https://github.com/ForceFledgling/CVE-2023-22518
A critical vulnerability in Atlassian Confluence Data Center and Server. The vulnerability could potentially allow unauthenticated attackers with network access to the Confluence Instance to restore the database of the Confluence instance and eventually execute arbitrary system commands.
https://github.com/ForceFledgling/CVE-2023-22518
GitHub
GitHub - ForceFledgling/CVE-2023-22518: Improper Authorization Vulnerability in Confluence Data Center and Server
Improper Authorization Vulnerability in Confluence Data Center and Server - ForceFledgling/CVE-2023-22518
■■■■□ Remote Code Execution in Tutanota Desktop due to Code Flaw.
https://www.sonarsource.com/blog/remote-code-execution-in-tutanota-desktop-due-to-code-flaw/
https://www.sonarsource.com/blog/remote-code-execution-in-tutanota-desktop-due-to-code-flaw/
Sonarsource
Remote Code Execution in Tutanota Desktop due to Code Flaw
Our Research team discovered critical code vulnerabilities in Proton Mail, Skiff, and Tutanota. This post covers an XSS vulnerability in Tutanota Desktop and how it can be prevented.
■■■■■ DuckDuckC2: A proof-of-concept C2 channel through DuckDuckGo's image proxy service. The provided example can be extended multiple ways to achieve different deployments.
https://github.com/nopcorn/DuckDuckC2
https://nopcorn.github.io/2023/09/25/duckduckgo-as-c2
https://github.com/nopcorn/DuckDuckC2
https://nopcorn.github.io/2023/09/25/duckduckgo-as-c2
GitHub
GitHub - nopcorn/DuckDuckC2: A proof-of-concept C2 channel through DuckDuckGo's image proxy service
A proof-of-concept C2 channel through DuckDuckGo's image proxy service - nopcorn/DuckDuckC2
■■■■□ Israel-Palestine Cyber-War update!
Snapshot of the Escalated Cyber Warfare in the 2023 Israel-Hamas Conflict : United Kingdom🇬🇧
Twelve pro-Palestinian hacker groups claimed to have targeted the United Kingdom, which supports Israel, and conducted defacement and DDoS attacks on approximately 34 British websites.
Snapshot of the Escalated Cyber Warfare in the 2023 Israel-Hamas Conflict : United Kingdom🇬🇧
Twelve pro-Palestinian hacker groups claimed to have targeted the United Kingdom, which supports Israel, and conducted defacement and DDoS attacks on approximately 34 British websites.
■■■□□ Bobber [tool]: Bobber monitors a given Evilginx database file for changes, and if a valid Evilginx session complete with a captured Microsoft Office 365 cookie is found, Bobber will utilize the RoadTools RoadTX library to retrieve the access and refresh tokens for the user, then optionally trigger TeamFiltration to exfiltrate all the sweet, sweet loot. Bobber supports monitoring a local file path or a file path on a remote host through SSH.
https://github.com/Flangvik/Bobber
https://github.com/Flangvik/Bobber
GitHub
GitHub - Flangvik/Bobber: Bounces when a fish bites - Evilginx database monitoring with exfiltration automation
Bounces when a fish bites - Evilginx database monitoring with exfiltration automation - Flangvik/Bobber
■■■□□ Hackers exploit Looney Tunables Linux bug, steal cloud creds.
https://www.bleepingcomputer.com/news/security/hackers-exploit-looney-tunables-linux-bug-steal-cloud-creds/
https://www.bleepingcomputer.com/news/security/hackers-exploit-looney-tunables-linux-bug-steal-cloud-creds/
BleepingComputer
Hackers exploit Looney Tunables Linux bug, steal cloud creds
The operators of the Kinsing malware are targeting cloud environments with systems vulnerable to "Looney Tunables," a Linux security issue identified as CVE-2023-4911 that allows a local attacker to gain root privileges on the system.
■■■■■ ⚛️ Nuclei AI Browser Extension, built on top of cloud.projectdiscovery.io, simplifies the creation of vulnerability templates, by enabling users to extract vulnerability information from any webpages to quickly and efficiently create #nuclei templates, saving valuable time and effort.
Features:
• Context Menu Option to Generate Template
• HackerOne Report to Nuclei Template Generation
• ExploitDB exploit to Nuclei Template Generation
• BugCrowd / Intigriti / Synack support (Coming soon).
https://github.com/projectdiscovery/nuclei-ai-extension
Features:
• Context Menu Option to Generate Template
• HackerOne Report to Nuclei Template Generation
• ExploitDB exploit to Nuclei Template Generation
• BugCrowd / Intigriti / Synack support (Coming soon).
https://github.com/projectdiscovery/nuclei-ai-extension
GitHub
GitHub - projectdiscovery/nuclei-ai-extension: Nuclei AI - Browser Extension for Rapid Nuclei Template Generation
Nuclei AI - Browser Extension for Rapid Nuclei Template Generation - projectdiscovery/nuclei-ai-extension
■■■■■ 🎭 ProxyHub: An advanced [Finder | Checker | Server] tool for proxy servers, supporting both HTTP(S) and SOCKS protocols.
https://github.com/ForceFledgling/proxyhub
https://github.com/ForceFledgling/proxyhub
GitHub
GitHub - ForceFledgling/proxyhub: An advanced [Finder | Checker | Server] tool for proxy servers, supporting both HTTP(S) and SOCKS…
An advanced [Finder | Checker | Server] tool for proxy servers, supporting both HTTP(S) and SOCKS protocols. 🎭 - ForceFledgling/proxyhub
■■□□□ Russian hackers switch to LOTL technique to cause power outages.
https://www.bleepingcomputer.com/news/security/russian-hackers-switch-to-lotl-technique-to-cause-power-outage/
https://www.bleepingcomputer.com/news/security/russian-hackers-switch-to-lotl-technique-to-cause-power-outage/
BleepingComputer
Russian hackers switch to LOTL technique to cause power outage
Russian state hackers have evolved their methods for breaching industrial control systems by adopting living-off-the-land techniques that enable reaching the final stage of the attack quicker and with less resources
■■■■□ Signal tests usernames that keep your phone number private.
https://www.bleepingcomputer.com/news/software/signal-tests-usernames-that-keep-your-phone-number-private/
https://www.bleepingcomputer.com/news/software/signal-tests-usernames-that-keep-your-phone-number-private/
BleepingComputer
Signal tests usernames that keep your phone number private
Signal is now testing public usernames that allow users to conceal the phone numbers linked to their accounts while communicating with others.
■■■■□ Cloudflare goes down as their website is downed by a DDoS attack claimed by Anonymous Sudan.
https://www.bleepingcomputer.com/news/technology/cloudflare-website-downed-by-ddos-attack-claimed-by-anonymous-sudan/
https://www.bleepingcomputer.com/news/technology/cloudflare-website-downed-by-ddos-attack-claimed-by-anonymous-sudan/
BleepingComputer
Cloudflare website downed by DDoS attack claimed by Anonymous Sudan
Cloudflare is investigating an ongoing outage causing 'We're sorry" Google errors to be shown on the company's website.