Fake IP sources using Linux's BPF feature
https://github.com/CodeChina888/FakeToa
https://github.com/CodeChina888/FakeToa
secbutler: The perfect butler for pentesters, bug-bounty hunters and security researchers
https://github.com/groundsec/secbutler
https://github.com/groundsec/secbutler
New payloads to exploit Error-based SQL injection - PostgreSQL database
https://www.mannulinux.org/2023/12/New-payloads-to-exploit-Error-based-SQL-injection-PostgreSQL-database.html
https://www.mannulinux.org/2023/12/New-payloads-to-exploit-Error-based-SQL-injection-PostgreSQL-database.html
Operation Triangulation: The last (hardware) mystery
https://securelist.com/operation-triangulation-the-last-hardware-mystery
https://securelist.com/operation-triangulation-the-last-hardware-mystery
POC usermode <=> kernel communication via ALPC
https://github.com/pTerrance/alpc-km-um
https://github.com/pTerrance/alpc-km-um
Keres: a is Powershell rev-shell backdoor with persistence
https://github.com/ELMERIKH/Keres
https://github.com/ELMERIKH/Keres
SignToolEx: uses Microsoft Detours hooking library to hijack "signtool.exe" and modify expired code-signing certificates to appear valid, allowing to codesign without changing system clock
https://github.com/hackerhouse-opensource/SignToolEx
https://github.com/hackerhouse-opensource/SignToolEx
40,000+ Nuclei templates for security scanning and detection across diverse web applications and services
https://github.com/linuxadi/40k-nuclei-templates
https://github.com/linuxadi/40k-nuclei-templates
Infostealer Exploit and the Enigma of Cookie Restoration
https://www.infostealers.com/article/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration
https://www.infostealers.com/article/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration
A small program written in C that is designed to load 32-bit shellcode and allow for execution or debugging
https://github.com/jstrosch/sclauncher
https://github.com/jstrosch/sclauncher
This PoC creates multiple processes, where each process performs a specific task as part of the injection operation
https://github.com/Maldev-Academy/Christmas
https://github.com/Maldev-Academy/Christmas
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools
https://github.com/hackerhouse-opensource/Marble
A CIA tradecraft technique to asynchronously detect when a process is created using WMI
https://github.com/hackerhouse-opensource/WMIProcessWatcher
https://github.com/hackerhouse-opensource/Marble
A CIA tradecraft technique to asynchronously detect when a process is created using WMI
https://github.com/hackerhouse-opensource/WMIProcessWatcher
Active Directory Pentesting from Linux
https://tbhaxor.com/active-directory-pentesting-from-linux
https://tbhaxor.com/active-directory-pentesting-from-linux
December 2023 BattlEye shellcode dump
https://github.com/SamuelTulach/be_shellcode_dump
https://github.com/SamuelTulach/be_shellcode_dump
Artillery: CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator
https://github.com/hackerhouse-opensource/Artillery
https://github.com/hackerhouse-opensource/Artillery
Compression using RDP API
https://gist.github.com/odzhan/56eb105a611dcdebd1d3a084c7312190
https://gist.github.com/odzhan/56eb105a611dcdebd1d3a084c7312190
Unmasking RedLine Stealer
https://www.infostealers.com/article/unmasking-redline-stealer
https://www.infostealers.com/article/unmasking-redline-stealer
Hide and Seek in Windows' Closet: Unmasking the WinSxS Hijacking Hideout
https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout
https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout
MITMonster: A monster cheatsheet on MITM attacks
https://github.com/wearecaster/MITMonster
https://github.com/wearecaster/MITMonster
Initial Access – search-ms URI Handler
https://pentestlab.blog/2024/01/02/initial-access-search-ms-uri-handler
https://pentestlab.blog/2024/01/02/initial-access-search-ms-uri-handler