Breaking Barriers: Unmasking the Easy Password Validation Bypass in Security Key Registration | How a Dumb Frontend Led to 750 $ Bounty
https://thecyberneh.medium.com/breaking-barriers-unmasking-the-easy-password-validation-bypass-in-security-key-registration-4cb0d8103a93
https://thecyberneh.medium.com/breaking-barriers-unmasking-the-easy-password-validation-bypass-in-security-key-registration-4cb0d8103a93
Use Wasm to Bypass Latest Chrome v8sbx Again
https://medium.com/@numencyberlabs/use-wasm-to-bypass-latest-chrome-v8sbx-again-639c4c05b157
https://medium.com/@numencyberlabs/use-wasm-to-bypass-latest-chrome-v8sbx-again-639c4c05b157
Phishing With Dynamite
https://medium.com/@fakasler/phishing-with-dynamite-7d33d8fac038
https://medium.com/@fakasler/phishing-with-dynamite-7d33d8fac038
ladder: Alternative to 12ft•io. Bypass paywalls with a proxy ladder and remove CORS headers from any URL
https://github.com/kubero-dev/ladder
https://github.com/kubero-dev/ladder
No-Consolation: A BOF that runs unmanaged PEs inline
https://github.com/fortra/No-Consolation
https://github.com/fortra/No-Consolation
LdrLibraryEx: A small x64 library to load dll's into memory
https://github.com/Cracked5pider/LdrLibraryEx
https://github.com/Cracked5pider/LdrLibraryEx
Fuzzer Development: The Soul of a New Machine
https://h0mbre.github.io/New_Fuzzer_Project
Source Code:
https://github.com/h0mbre/Lucid
https://h0mbre.github.io/New_Fuzzer_Project
Source Code:
https://github.com/h0mbre/Lucid
Persistence – Windows Telemetry
https://pentestlab.blog/2023/11/06/persistence-windows-telemetry
https://pentestlab.blog/2023/11/06/persistence-windows-telemetry
Bypassing Android 13 Restrictions with SecuriDropper
https://www.threatfabric.com/blogs/droppers-bypassing-android-13-restrictions
https://www.threatfabric.com/blogs/droppers-bypassing-android-13-restrictions
Nuclei templates for honeypots detection
https://github.com/UnaPibaGeek/honeypots-detection
https://github.com/UnaPibaGeek/honeypots-detection
SharpVeeamDecryptor: Decrypt Veeam database passwords
https://github.com/S3cur3Th1sSh1t/SharpVeeamDecryptor
https://github.com/S3cur3Th1sSh1t/SharpVeeamDecryptor
WolfPack: combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale
https://github.com/RoseSecurity-Research/WolfPack
https://github.com/RoseSecurity-Research/WolfPack
teams_dump: PoC for dumping and decrypting cookies in the latest version of Microsoft Teams
https://github.com/byinarie/teams_dump
https://github.com/byinarie/teams_dump
DuckDuckC2: A proof-of-concept C2 channel through DuckDuckGo's image proxy service
https://github.com/nopcorn/DuckDuckC2
https://github.com/nopcorn/DuckDuckC2
CallstackSpoofingPOC: C++ self-Injecting dropper based on various EDR evasion techniques
https://github.com/pard0p/CallstackSpoofingPOC
https://github.com/pard0p/CallstackSpoofingPOC
Attacking an EDR - Part 3
https://riccardoancarani.github.io/2023-11-07-attacking-an-edr-part-3
https://riccardoancarani.github.io/2023-11-07-attacking-an-edr-part-3
SharpLateral: is a tool that includes 4 different methods for performing lateral movement in the AD environment and is written in C#
https://github.com/mertdas/SharpLateral
https://github.com/mertdas/SharpLateral
.NetConfigLoader: List of .Net application signed by Microsoft that can be used to load a dll via a .config file. Ideal for EDR/AV evasion and execution policy bypass
https://github.com/Mr-Un1k0d3r/.NetConfigLoader
https://github.com/Mr-Un1k0d3r/.NetConfigLoader
On-Prem Software CVE-2023-47246 Vulnerability
https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification
https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification
Abusing Microsoft Access "Linked Table" Feature to Perform NTLM Forced Authentication Attacks
https://research.checkpoint.com/2023/abusing-microsoft-access-linked-table-feature-to-perform-ntlm-forced-authentication-attacks
https://research.checkpoint.com/2023/abusing-microsoft-access-linked-table-feature-to-perform-ntlm-forced-authentication-attacks