🕷 Writing Malware With ChatGPT
#AIOPS #DarkGPT
https://moohax.substack.com/p/writing-malware-with-chatgpt
#AIOPS #DarkGPT
https://moohax.substack.com/p/writing-malware-with-chatgpt
moohax blog
Writing Malware With ChatGPT
There are a lot of articles floating around about how ChatGPT can or can't write malware, and I tend to avoid them. But having been in this blended ML Security space for a while now, I thought I might have something useful to share. In this post I'll write…
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from artmine
Саундтрек последних 370 дней, каждое слово. Одну часть чувствую, вторую заставляю себя не забывать.
Всегда нуждою других себя занимая
Всегда что-то красивое творя
Мы движемся в сторону рая
Через ненависти моря
https://www.youtube.com/watch?v=W7li-_sDQKg
Всегда нуждою других себя занимая
Всегда что-то красивое творя
Мы движемся в сторону рая
Через ненависти моря
https://www.youtube.com/watch?v=W7li-_sDQKg
YouTube
Дельфин - 520
Альбом «442»
Слушать в AppleMusic: http://goo.gl/caeFh2
Режиссёр: Валентин Блох
Музыка: Дельфин
Оператор: Олег Шел
Механик камеры и фокуспуллер: Павел Смоляков
Гафер: Игорь Винокуров
Постпродакшн: студия "НОС"
Монтаж: Владислав Гаитов
Ассистент монтажа:…
Слушать в AppleMusic: http://goo.gl/caeFh2
Режиссёр: Валентин Блох
Музыка: Дельфин
Оператор: Олег Шел
Механик камеры и фокуспуллер: Павел Смоляков
Гафер: Игорь Винокуров
Постпродакшн: студия "НОС"
Монтаж: Владислав Гаитов
Ассистент монтажа:…
🎵 RUDIMENTAL - SO SORRY
2021 год. Вышел 4ый LP Rudimental - Ground Control, который я как то пропустил... Сейчас слушаю и охреневаю от качества. Ребята писали альбом во время локдауна и говорят что это их самый сконцентрированный альбом. Каждый трек хит, но хочется особенно отметить этот коллаб со Skream (легенда UK dubstep). Трансовый вокал, синты, прямая бочка, брейкбит трек вне всяких жанров.
Отдельно респект за видеоряд, много деталей, игра актеров, сам месседж, можно делать отдельный разбор.
https://www.youtube.com/watch?v=V5sawgVLtjI
2021 год. Вышел 4ый LP Rudimental - Ground Control, который я как то пропустил... Сейчас слушаю и охреневаю от качества. Ребята писали альбом во время локдауна и говорят что это их самый сконцентрированный альбом. Каждый трек хит, но хочется особенно отметить этот коллаб со Skream (легенда UK dubstep). Трансовый вокал, синты, прямая бочка, брейкбит трек вне всяких жанров.
Отдельно респект за видеоряд, много деталей, игра актеров, сам месседж, можно делать отдельный разбор.
https://www.youtube.com/watch?v=V5sawgVLtjI
YouTube
Rudimental x Skream - So Sorry [Official Video]
The official music video for Rudimental X Skream - So Sorry
Taken from their fourth studio album 'Ground Control' out 3rd September 2021 - Pre-order now: https://lnk.to/Ground-Control-PreSave
Subscribe to the Rudimental channel for all the best and latest…
Taken from their fourth studio album 'Ground Control' out 3rd September 2021 - Pre-order now: https://lnk.to/Ground-Control-PreSave
Subscribe to the Rudimental channel for all the best and latest…
Тут Starkiller обновился для Empire C2, который тоже получил апгрейд до версии 5.0. Из особенностей, теперь нет необходимости ставить его отдельно, он идет "в коробке" с Empire как модуль и работает с Empire API. Также появилось много фич в удобстве использования UI.
https://github.com/BC-SECURITY/Starkiller
https://github.com/BC-SECURITY/Starkiller
GitHub
GitHub - BC-SECURITY/Starkiller: Starkiller is a Frontend for PowerShell Empire.
Starkiller is a Frontend for PowerShell Empire. Contribute to BC-SECURITY/Starkiller development by creating an account on GitHub.
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Кому интересно прям погрузиться во внутрянку и теоретически, и практически, очень рекомендую данный блог! Очень стоящий материал, при том на русском)
https://ardent101.github.io/
https://ardent101.github.io/
Ardent101
Pentest blog
👎1
#Redteam #lolbas #gtfobins #wadcoms #hijacklibs
🚬 What is DLL Hijacking?
DLL Hijacking is, in the broadest sense, tricking a legitimate/trusted application into loading an arbitrary DLL. Defensive measures such as AV and EDR solutions may not pick up on this activity out of the box, and allow-list applications such as AppLocker may not block the execution of the untrusted code. There are numerous examples of threat actors that have been observed to leaverage DLL Hijacking to achieve their objectives.
There are various subtypes of DLL Hijacking, such as DLL Search Order Hijacking (T1574.001) and DLL Sideloading (T1574.002). An overview of useful resources explaining various aspects of DLL Hijacking can be found here.
https://hijacklibs.net/
DLL Hijacking is, in the broadest sense, tricking a legitimate/trusted application into loading an arbitrary DLL. Defensive measures such as AV and EDR solutions may not pick up on this activity out of the box, and allow-list applications such as AppLocker may not block the execution of the untrusted code. There are numerous examples of threat actors that have been observed to leaverage DLL Hijacking to achieve their objectives.
There are various subtypes of DLL Hijacking, such as DLL Search Order Hijacking (T1574.001) and DLL Sideloading (T1574.002). An overview of useful resources explaining various aspects of DLL Hijacking can be found here.
https://hijacklibs.net/
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from APT
🌐 DroppedConnection — Cisco ASA Anyconnect Emulator
Fake VPN server that captures credentials and executes code via the Cisco AnyConnect client.
Source:
https://github.com/nccgroup/DroppedConnection
Research:
https://research.nccgroup.com/2023/03/01/making-new-connections-leveraging-cisco-anyconnect-client-to-drop-and-run-payloads/
#cisco #asa #anyconnect #credentials #redteam
Fake VPN server that captures credentials and executes code via the Cisco AnyConnect client.
Source:
https://github.com/nccgroup/DroppedConnection
Research:
https://research.nccgroup.com/2023/03/01/making-new-connections-leveraging-cisco-anyconnect-client-to-drop-and-run-payloads/
#cisco #asa #anyconnect #credentials #redteam
😱1
#C2 #REDTEAM #NIM #EVASION #RAT
https://github.com/itaymigdal/Nimbo-C2
Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim, with some usage of .NET on Windows (by dynamically loading the CLR to the process). Nim is powerful, but interacting with Windows is much easier and robust using Powershell, hence this combination is made. The Linux agent is slimer and capable only of basic commands, including ELF loading using the memfd technique.https://github.com/itaymigdal/Nimbo-C2
GitHub
GitHub - itaymigdal/Nimbo-C2: Nimbo-C2 is yet another (simple and lightweight) C2 framework
Nimbo-C2 is yet another (simple and lightweight) C2 framework - itaymigdal/Nimbo-C2
#Redteam #C2 #NIM #EVASION
NimPlant - A light first-stage C2 implant written in Nim and Python
-
https://github.com/chvancooten/NimPlant
NimPlant - A light first-stage C2 implant written in Nim and Python
-
Lightweight and configurable implant written in the Nim programming language
- Pretty web GUI that will make you look cool during all your ops
- Encryption and compression of all traffic by default, obfuscates static strings in implant artefacts
- Support for several implant types, including native binaries (exe/dll), shellcode or self-deleting executables
- Wide selection of commands focused on early-stage operations including local enumeration, file or registry management, and web interactions
- Easy deployment of more advanced functionality or payloads via inline-execute, shinject (using dynamic invocation), or in-thread execute-assembly
- Support for operations on any platform, implant only targeting x64 Windows for now
- Comprehensive logging of all interactions and file operations
- Much, much more, just see below :)https://github.com/chvancooten/NimPlant
GitHub
GitHub - chvancooten/NimPlant: A light-weight first-stage C2 implant written in Nim (and Rust).
A light-weight first-stage C2 implant written in Nim (and Rust). - chvancooten/NimPlant
#Redteam #potato #privesc #windows
Любите картошку? Я тоже, особенно посвежее..)
https://github.com/wh0amitz/PetitPotato
Любите картошку? Я тоже, особенно посвежее..)
PetitPotam does not work on newer versions of Windows due to the limitations of related patches. However, setting AuthnLevel to RPC_C_AUTHN_LEVEL_PKT_PRIVACY via RpcBindingSetAuthInfoW before calling EFS works on latest systems.https://github.com/wh0amitz/PetitPotato
GitHub
GitHub - wh0amitz/PetitPotato: Local privilege escalation via PetitPotam (Abusing impersonate privileges).
Local privilege escalation via PetitPotam (Abusing impersonate privileges). - wh0amitz/PetitPotato
#EDM #Skrillex #LP
🔥 Skrillex 2023 ALBUM
https://soundcloud.com/skrillex/sets/quest-for-fire
QUEST FOR FIRE https://soundcloud.com/skrillex/sets/quest-for-fire
Please open Telegram to view this post
VIEW IN TELEGRAM
SoundCloud
QUEST FOR FIRE
Twitter / TikTok: Skrillex
F*CK U SKRILLEX YOU THINK UR ANDY WARHOL BUT UR NOT!! <3 out now: https://skrillex.lnk.to/fus
Get more music from Skrillex
Spotify: https://skrillex.lnk.to/Spotify
Apple
F*CK U SKRILLEX YOU THINK UR ANDY WARHOL BUT UR NOT!! <3 out now: https://skrillex.lnk.to/fus
Get more music from Skrillex
Spotify: https://skrillex.lnk.to/Spotify
Apple
⚡1👎1🔥1🫡1