FormThief: is a project designed for spoofing Windows desktop login applications using WinForms and WPF
https://github.com/mlcsec/FormThief
https://github.com/mlcsec/FormThief
Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies
https://github.com/naksyn/Embedder
https://github.com/naksyn/Embedder
RustRedOps: is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust language
https://github.com/joaoviictorti/RustRedOps
https://github.com/joaoviictorti/RustRedOps
Account Takeover [It Looked Secure at First]
https://cristivlad.medium.com/account-takeover-it-looked-secure-at-first-f14a31cb7f5c
How I Hacked the Dutch Government: Exploiting an Innocent Image for Remote Code Execution
https://medium.com/@mukundbhuva/how-i-hacked-the-dutch-government-exploiting-an-innocent-image-for-remote-code-execution-df1fa936e46a
https://cristivlad.medium.com/account-takeover-it-looked-secure-at-first-f14a31cb7f5c
How I Hacked the Dutch Government: Exploiting an Innocent Image for Remote Code Execution
https://medium.com/@mukundbhuva/how-i-hacked-the-dutch-government-exploiting-an-innocent-image-for-remote-code-execution-df1fa936e46a
A modern dashboard exploit for the original Microsoft Xbox
https://github.com/XboxDev/endgame-exploit
A Proof of Concept to exploit an authentication bypass to add a new administrative user in ConnectWise ScreenConnect
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
Nuclei template and information about the PoC for CVE-2024-25600 The Bricks theme for WordPress is vulnerable to RCE
https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template
https://github.com/XboxDev/endgame-exploit
A Proof of Concept to exploit an authentication bypass to add a new administrative user in ConnectWise ScreenConnect
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
Nuclei template and information about the PoC for CVE-2024-25600 The Bricks theme for WordPress is vulnerable to RCE
https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template
SpawnWith: An experimental Beacon Object File (BOF) that provides an alternative to the spawnas and inject commands
https://github.com/rasta-mouse/SpawnWith
https://github.com/rasta-mouse/SpawnWith
muddy: is a static string obfuscation library, designed to provide an easy way of avoiding simple static binary analysis tools such as strings or YARA rules
https://github.com/orph3usLyre/muddy-waters
https://github.com/orph3usLyre/muddy-waters
Following MITRE's footsteps in analyzing malware behavior
https://blog.virustotal.com/2024/02/following-in-mitres-footsteps-and.html
https://blog.virustotal.com/2024/02/following-in-mitres-footsteps-and.html
TinyTurla-NG in-depth tooling and command and control analysis
https://blog.talosintelligence.com/tinyturla-ng-tooling-and-c2
https://blog.talosintelligence.com/tinyturla-ng-tooling-and-c2
Shelter: is a completely weaponized sleep obfuscation technique that allows to fully encrypt your in-memory payload making an extensive use of ROP
https://github.com/Kudaes/Shelter
https://github.com/Kudaes/Shelter
AI ChatBot <= 4.8.9 - Unauthenticated SQL Injection via qc_wpbo_search_response
https://github.com/RandomRobbieBF/CVE-2023-5204
TP-Link NCXXX Authentication Bypass
https://ssd-disclosure.com/ssd-advisory-tp-link-ncxxx-authentication-bypass
https://github.com/RandomRobbieBF/CVE-2023-5204
TP-Link NCXXX Authentication Bypass
https://ssd-disclosure.com/ssd-advisory-tp-link-ncxxx-authentication-bypass
CLRInjector: A PoC .NET-specific process injection tool
https://github.com/bananabr/CLRInjector
https://github.com/bananabr/CLRInjector
EPSS (Exploit Prediction Scoring System) is a framework used to assess the likelihood of a vulnerability being exploited
https://github.com/KaanSK/go-epss
https://github.com/KaanSK/go-epss
Hello Lucee! Let us hack Apple again?
https://blog.projectdiscovery.io/hello-lucee-let-us-hack-apple-again
https://blog.projectdiscovery.io/hello-lucee-let-us-hack-apple-again
LockBit Attempts to Stay Afloat With a New Version
https://www.trendmicro.com/en_us/research/24/b/lockbit-attempts-to-stay-afloat-with-a-new-version
https://www.trendmicro.com/en_us/research/24/b/lockbit-attempts-to-stay-afloat-with-a-new-version
This repository contains Resources for malware development using Rust
https://github.com/Whitecat18/Rust-for-Malware-Development
https://github.com/Whitecat18/Rust-for-Malware-Development
Chunking CobaltStrike Payloads + Jump Method
https://github.com/DamonMohammadbagher/NativePayload_LocalCreateThread7
https://github.com/DamonMohammadbagher/NativePayload_LocalCreateThread7
ADCSCoercePotato: Yet another technique for coercing machine authentication but specific for ADCS server
https://github.com/decoder-it/ADCSCoercePotato
https://github.com/decoder-it/ADCSCoercePotato
A handy tool to explore various string encoding
https://github.com/unixzii/StringExplorer
https://github.com/unixzii/StringExplorer