Bob the Smuggler: A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip file format, then XOR encrypt the archive and then hides inside PNG/GIF image file format (Image Polyglots)
https://github.com/TheCyb3rAlpha/BobTheSmuggler
https://github.com/TheCyb3rAlpha/BobTheSmuggler
Breaking the Flash Encryption Feature of Espressif's Parts
https://courk.cc/breaking-flash-encryption-of-espressif-parts
https://courk.cc/breaking-flash-encryption-of-espressif-parts
Thousands of Sites with Popup Builder Compromised by Balada Injector
https://blog.sucuri.net/2024/01/thousands-of-sites-with-popup-builder-compromised-by-balada-injector
https://blog.sucuri.net/2024/01/thousands-of-sites-with-popup-builder-compromised-by-balada-injector
CVE-2023-7028 | Account-Take-Over Gitlab
https://github.com/Vozec/CVE-2023-7028
CVE-2023-36003 (Windows LPE XAML diagnostics API)
https://github.com/m417z/CVE-2023-36003-POC
CVE-2024-20656: Windows LPE in the VSStandardCollectorService150 service
https://github.com/Wh04m1001/CVE-2024-20656
https://github.com/Vozec/CVE-2023-7028
CVE-2023-36003 (Windows LPE XAML diagnostics API)
https://github.com/m417z/CVE-2023-36003-POC
CVE-2024-20656: Windows LPE in the VSStandardCollectorService150 service
https://github.com/Wh04m1001/CVE-2024-20656
swarm: Formerly known as axiom, swarm is the next generation of distributed cloud scanning and attack surface monitoring
https://github.com/swarmsecurity/swarm
https://github.com/swarmsecurity/swarm
Hunting for SSRF Bugs in PDF Generators
https://www.blackhillsinfosec.com/hunting-for-ssrf-bugs-in-pdf-generators
https://www.blackhillsinfosec.com/hunting-for-ssrf-bugs-in-pdf-generators
Crafting Malicious Pluggable Authentication Modules for Persistence, Privilege Escalation, and Lateral Movement
https://rosesecurityresearch.com/crafting-malicious-pluggable-authentication-modules-for-persistence-privilege-escalation-and-lateral-movement
https://rosesecurityresearch.com/crafting-malicious-pluggable-authentication-modules-for-persistence-privilege-escalation-and-lateral-movement
DFSCoerce exe revisited version with custom authentication
https://github.com/decoder-it/DFSCoerce-exe-2
https://github.com/decoder-it/DFSCoerce-exe-2
ASLRn’t: How memory alignment broke library ASLR
https://zolutal.github.io/aslrnt
https://zolutal.github.io/aslrnt
VBA: having fun with macros, overwritten pointers & R/W/X memory
https://adepts.of0x.cc/vba-hijack-pointers-rwa
https://adepts.of0x.cc/vba-hijack-pointers-rwa
MutationGate: is a new approach to bypass EDR's inline hooking by utilizing hardware breakpoint to redirect the syscall
https://github.com/senzee1984/MutationGate
https://github.com/senzee1984/MutationGate
A lightweight method to detect potential iOS malware
https://securelist.com/shutdown-log-lightweight-ios-malware-detection-method
iShutdown scripts: extracts, analyzes, and parses Shutdown.log forensic artifact from iOS Sysdiagnose archives
https://github.com/KasperskyLab/iShutdown
https://securelist.com/shutdown-log-lightweight-ios-malware-detection-method
iShutdown scripts: extracts, analyzes, and parses Shutdown.log forensic artifact from iOS Sysdiagnose archives
https://github.com/KasperskyLab/iShutdown
Hunting down the HVCI bug in UEFI
https://tandasat.github.io/blog/2024/01/15/CVE-2024-21305
https://tandasat.github.io/blog/2024/01/15/CVE-2024-21305
Lateral Movement – Visual Studio DTE
https://pentestlab.blog/2024/01/15/lateral-movement-visual-studio-dte
https://pentestlab.blog/2024/01/15/lateral-movement-visual-studio-dte
Reversing and Tooling a Signed Request Hash in Obfuscated JavaScript
https://buer.haus/2024/01/16/reversing-and-tooling-a-signed-request-hash-in-obfuscated-javascript
https://buer.haus/2024/01/16/reversing-and-tooling-a-signed-request-hash-in-obfuscated-javascript
LOTL: This is a fileless living off the land reverse shell written in JScript and Powershell script
https://github.com/Null-byte-00/LOTL
https://github.com/Null-byte-00/LOTL
LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time
https://github.com/janoglezcampos/llvm-yx-callobfuscator
https://github.com/janoglezcampos/llvm-yx-callobfuscator
Phishing using Google Sheets for Red Team Engagements
https://infosecwriteups.com/phishing-using-google-sheets-for-red-team-engagements-ac79298ddb90
https://infosecwriteups.com/phishing-using-google-sheets-for-red-team-engagements-ac79298ddb90
Dark web threats and dark market predictions for 2024
https://securelist.com/darknet-predictions-for-2024
https://securelist.com/darknet-predictions-for-2024
Cobalt Strike Profiles for EDR Evasion + SourcePoint is a C2 profile generator for Cobalt Strike
https://github.com/EvilGreys/Cobalt-Strike-Profiles-for-EDR-Evasion
https://github.com/EvilGreys/Cobalt-Strike-Profiles-for-EDR-Evasion
Yet another C++ Cobalt Strike beacon dropper with Ntdll unhooking, PPID spoofing and custom Process hollowing
https://github.com/ProcessusT/Venoma
https://github.com/ProcessusT/Venoma