Refresh: Compromising F5 BIG-IP With Request Smuggling | CVE-2023-46747
https://www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747
https://www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747
java_gate: Java JNI HellsGate/HalosGate/TartarusGate/RecycledGate/SSN Syscall/Many Shellcode Loaders
https://github.com/4ra1n/java-gate
https://github.com/4ra1n/java-gate
ADCSsync: This is a tool I whipped up together quickly to DCSync utilizing ESC1
https://github.com/JPG0mez/ADCSync
https://github.com/JPG0mez/ADCSync
NinjaInjector: Classic Process Injection with Memory Evasion Techniques implemantation
https://github.com/S12cybersecurity/NinjaInjector
https://github.com/S12cybersecurity/NinjaInjector
LDAPMon: is a POC telemetry collector for the Microsoft-Windows-LDAP-Client ETW Provider
https://github.com/jsecurity101/LDAPMon
https://github.com/jsecurity101/LDAPMon
Uncovering Adversarial LDAP Tradecraft
https://www.binarydefense.com/resources/blog/uncovering-adversarial-ldap-tradecraft
https://www.binarydefense.com/resources/blog/uncovering-adversarial-ldap-tradecraft
Lateral Movement: Abuse the Power of DCOM Excel Application
https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
Exploring Antivirus and EDR evasion techniques step-by-step. Part 1
https://infosecwriteups.com/exploring-antivirus-and-edr-evasion-techniques-step-by-step-part-1-6459563b12ea
https://infosecwriteups.com/exploring-antivirus-and-edr-evasion-techniques-step-by-step-part-1-6459563b12ea
CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys
https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking
https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking
Netsupport Intrusion Results in Domain Compromise
https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise
https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise
Simple presentation of Early Bird APC Injection technique
https://github.com/Faran-17/EarlyBird-APC-Injection
https://github.com/Faran-17/EarlyBird-APC-Injection
TrampHooker: A mechanism that trampoline hooks functions in x86/x64 systems
https://github.com/splexas/TrampHooker
https://github.com/splexas/TrampHooker
Magikarp: is a cryptographic command-line utility designed for secure file operations using Elliptic Curve Cryptography (ECC)
https://github.com/FuzzySecurity/Magikarp
https://github.com/FuzzySecurity/Magikarp
LDAP authentication in Active Directory environments
https://offsec.almond.consulting/ldap-authentication-in-active-directory-environments
https://offsec.almond.consulting/ldap-authentication-in-active-directory-environments
A Retrospective on AvosLocker
https://www.zscaler.com/blogs/security-research/retrospective-avoslocker
https://www.zscaler.com/blogs/security-research/retrospective-avoslocker
LdrLockLiberator: is a collection of techniques for escaping or otherwise forgoing Loader Lock while executing your code from DllMain or anywhere else the lock may be present
https://github.com/ElliotKillick/LdrLockLiberator
https://github.com/ElliotKillick/LdrLockLiberator
abuseACL: A python script to automatically list vulnerable Windows ACEs/ACLs
https://github.com/AetherBlack/abuseACL
https://github.com/AetherBlack/abuseACL
OLE_object_are_still_dangerous_today_ā_Exploiting_Microsoft_Office.pdf
623.8 KB
OLE object are still dangerous today ā Exploiting Microsoft Office
https://github.com/edwardzpeng/presentations/tree/main/POC%202023
https://github.com/edwardzpeng/presentations/tree/main/POC%202023
Real profit
Legba: is a multiprotocol credentials bruteforcer / password sprayer and enumerator built with Rust and the Tokio asynchronous runtime in order to achieve better performances and stability while consuming less resources than similar tools https://github.cā¦
Enumerate/Bruteforce/Attack All the Things!
Presenting Legba
https://www.evilsocket.net/2023/11/02/Enumerate-Bruteforce-Attack-All-The-Things-Presenting-Legba
Presenting Legba
https://www.evilsocket.net/2023/11/02/Enumerate-Bruteforce-Attack-All-The-Things-Presenting-Legba
JS-Tap: Weaponizing JavaScript for Red Teams
https://trustedsec.com/blog/js-tap-weaponizing-javascript-for-red-teams
https://trustedsec.com/blog/js-tap-weaponizing-javascript-for-red-teams