Flare-On 2023 Challenge 7 (flake) - Solving a compiled Python challenge using native tools
https://www.x86matthew.com/view_post?id=flareon_2023_7
https://www.x86matthew.com/view_post?id=flareon_2023_7
Awesome GPT Agents:
A curated list of GPT agents for cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
A curated list of GPT agents for cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
Exploring Antivirus and EDR evasion techniques step-by-step
Part 1:
https://infosecwriteups.com/exploring-antivirus-and-edr-evasion-techniques-step-by-step-part-1-6459563b12ea
Part 2:
https://infosecwriteups.com/exploring-antivirus-and-edr-evasion-techniques-step-by-step-part-2-4310c58cdc31
Part 1:
https://infosecwriteups.com/exploring-antivirus-and-edr-evasion-techniques-step-by-step-part-1-6459563b12ea
Part 2:
https://infosecwriteups.com/exploring-antivirus-and-edr-evasion-techniques-step-by-step-part-2-4310c58cdc31
2023-A-3-Years-Tale-of-Hacking-a-Pwn2Own-Target.pdf
3.2 MB
HEXACON2023 - A 3-Year Tale of Hacking a Pwn2Own Target by Orange Tsai
Video:
https://www.youtube.com/watch?v=uGofhlB1vZU
Slides:
https://github.com/orangetw/My-Presentation-Slides/blob/main/data/2023-A-3-Years-Tale-of-Hacking-a-Pwn2Own-Target.pdf
Video:
https://www.youtube.com/watch?v=uGofhlB1vZU
Slides:
https://github.com/orangetw/My-Presentation-Slides/blob/main/data/2023-A-3-Years-Tale-of-Hacking-a-Pwn2Own-Target.pdf
Shellcode Loader/Execute Shellcode - Automate with Python Programming
https://www.youtube.com/watch?v=hWbfifU8TtA&feature
https://www.youtube.com/watch?v=hWbfifU8TtA&feature
Wndows-Drive-Remapping-EoP: Windows System Drive Remapping - Elevation of Privileges
https://github.com/bluefrostsecurity/Windows-Drive-Remapping-EoP
https://github.com/bluefrostsecurity/Windows-Drive-Remapping-EoP
SharpReflectivePEInjection: reflectively load and execute PEs locally and remotely bypassing EDR hooks
https://github.com/cpu0x00/SharpReflectivePEInjection
https://github.com/cpu0x00/SharpReflectivePEInjection
MS Graph Commands and Tools for Blue Teamers
https://github.com/xg5-simon/MS-Graph-BlueTeam
https://github.com/xg5-simon/MS-Graph-BlueTeam
VisualStudio .suo deserialization Exploit
https://github.com/moom825/visualstudio-suo-exploit
https://github.com/moom825/visualstudio-suo-exploit
GPT Crawler: Crawl a site to generate knowledge files to create your own custom GPT
https://github.com/BuilderIO/gpt-crawler
https://github.com/BuilderIO/gpt-crawler
HackerGPT: is your indispensable digital companion in the world of hacking. Crafted with the unique needs of ethical hackers in mind, this AI-powered assistant stands at the forefront of hacking knowledge and assistance
https://github.com/Hacker-GPT/HackerGPT
https://github.com/Hacker-GPT/HackerGPT
Report and Exploit of CVE-2023-36427
Summary:
Kernel-mode code in the root partition can corrupt arbitrary physical pages irrespective of EPT permissions using the Hardware Feedback Interface processor feature
https://github.com/tandasat/CVE-2023-36427
Summary:
Kernel-mode code in the root partition can corrupt arbitrary physical pages irrespective of EPT permissions using the Hardware Feedback Interface processor feature
https://github.com/tandasat/CVE-2023-36427
Reptar: an Intel Ice Lake CPU vulnerability
https://lock.cmpxchg8b.com/reptar.html
https://lock.cmpxchg8b.com/reptar.html
HostingHunter Series: Change Way Technology CO. Limited
https://medium.com/@joshuapenny88/hostinghunter-series-chang-way-technologies-co-limited-a9ba4fce0f65
https://medium.com/@joshuapenny88/hostinghunter-series-chang-way-technologies-co-limited-a9ba4fce0f65
The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
https://research.nccgroup.com/2023/11/15/the-spelling-police-searching-for-malicious-http-servers-by-identifying-typos-in-http-responses
https://research.nccgroup.com/2023/11/15/the-spelling-police-searching-for-malicious-http-servers-by-identifying-typos-in-http-responses
Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 2)
https://blog.hacktivesecurity.com/index.php/2023/11/15/inside-the-mind-of-a-cyber-attacker-from-malware-creation-to-data-exfiltration-part-2
https://blog.hacktivesecurity.com/index.php/2023/11/15/inside-the-mind-of-a-cyber-attacker-from-malware-creation-to-data-exfiltration-part-2
Escaping the sandbox: A bug that speaks for itself
https://microsoftedge.github.io/edgevr/posts/Escaping-the-sandbox-A-bug-that-speaks-for-itself
https://microsoftedge.github.io/edgevr/posts/Escaping-the-sandbox-A-bug-that-speaks-for-itself