Probuster: A Python based Web Application Penetration testing tool for Information Gathering
https://github.com/sanjai-AK47/Probuster
https://github.com/sanjai-AK47/Probuster
Simple Memory Patcher Made With API Hooking
https://github.com/idkhidden/Memory-Patcher
https://github.com/idkhidden/Memory-Patcher
The Google 0-day all Infostealer groups are exploiting
https://www.infostealers.com/article/the-0-day-all-infostealer-groups-are-exploiting
https://www.infostealers.com/article/the-0-day-all-infostealer-groups-are-exploiting
Real profit
Silly EDR Bypasses and Where To Find Them https://malwaretech.com/2023/12/silly-edr-bypasses-and-where-to-find-them
EDRception: PoC for abusing exception handlers to hook and bypass user mode EDR hooks
https://github.com/MalwareTech/EDRception
https://github.com/MalwareTech/EDRception
This is a POC for a CLR sleep obfuscation attempt
It use IHostMemoryManager interface to control the memory allocated by the CLR
https://github.com/lap1nou/CLR_Heap_encryption
It use IHostMemoryManager interface to control the memory allocated by the CLR
https://github.com/lap1nou/CLR_Heap_encryption
How I Found SQL Injection worth of $4,000 bounty
https://roberto99.medium.com/how-i-found-sql-injection-worth-of-4-000-bounty-16ca09cbf8ec
https://roberto99.medium.com/how-i-found-sql-injection-worth-of-4-000-bounty-16ca09cbf8ec
Fake IP sources using Linux's BPF feature
https://github.com/CodeChina888/FakeToa
https://github.com/CodeChina888/FakeToa
secbutler: The perfect butler for pentesters, bug-bounty hunters and security researchers
https://github.com/groundsec/secbutler
https://github.com/groundsec/secbutler
New payloads to exploit Error-based SQL injection - PostgreSQL database
https://www.mannulinux.org/2023/12/New-payloads-to-exploit-Error-based-SQL-injection-PostgreSQL-database.html
https://www.mannulinux.org/2023/12/New-payloads-to-exploit-Error-based-SQL-injection-PostgreSQL-database.html
Operation Triangulation: The last (hardware) mystery
https://securelist.com/operation-triangulation-the-last-hardware-mystery
https://securelist.com/operation-triangulation-the-last-hardware-mystery
POC usermode <=> kernel communication via ALPC
https://github.com/pTerrance/alpc-km-um
https://github.com/pTerrance/alpc-km-um
Keres: a is Powershell rev-shell backdoor with persistence
https://github.com/ELMERIKH/Keres
https://github.com/ELMERIKH/Keres
SignToolEx: uses Microsoft Detours hooking library to hijack "signtool.exe" and modify expired code-signing certificates to appear valid, allowing to codesign without changing system clock
https://github.com/hackerhouse-opensource/SignToolEx
https://github.com/hackerhouse-opensource/SignToolEx
40,000+ Nuclei templates for security scanning and detection across diverse web applications and services
https://github.com/linuxadi/40k-nuclei-templates
https://github.com/linuxadi/40k-nuclei-templates
Infostealer Exploit and the Enigma of Cookie Restoration
https://www.infostealers.com/article/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration
https://www.infostealers.com/article/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration
A small program written in C that is designed to load 32-bit shellcode and allow for execution or debugging
https://github.com/jstrosch/sclauncher
https://github.com/jstrosch/sclauncher
This PoC creates multiple processes, where each process performs a specific task as part of the injection operation
https://github.com/Maldev-Academy/Christmas
https://github.com/Maldev-Academy/Christmas
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools
https://github.com/hackerhouse-opensource/Marble
A CIA tradecraft technique to asynchronously detect when a process is created using WMI
https://github.com/hackerhouse-opensource/WMIProcessWatcher
https://github.com/hackerhouse-opensource/Marble
A CIA tradecraft technique to asynchronously detect when a process is created using WMI
https://github.com/hackerhouse-opensource/WMIProcessWatcher
Active Directory Pentesting from Linux
https://tbhaxor.com/active-directory-pentesting-from-linux
https://tbhaxor.com/active-directory-pentesting-from-linux
December 2023 BattlEye shellcode dump
https://github.com/SamuelTulach/be_shellcode_dump
https://github.com/SamuelTulach/be_shellcode_dump