Achieving DLL Side-Loading in the Original Process
https://www.okiok.com/achieving-dll-side-loading-in-the-original-process
https://www.okiok.com/achieving-dll-side-loading-in-the-original-process
Leveraging the Direct Pointer A Stealthy Maneuver in Evasion Tactics
https://lsecqt.github.io/Red-Teaming-Army/malware-development/leveraging-the-direct-pointer---a-stealthy-maneuver-in-evasion-tactics
https://lsecqt.github.io/Red-Teaming-Army/malware-development/leveraging-the-direct-pointer---a-stealthy-maneuver-in-evasion-tactics
Finding pastures new: An alternate approach for implant design
https://medium.com/@sapientflow/finding-pastures-new-an-alternate-approach-for-implant-design-644611c526ca
https://medium.com/@sapientflow/finding-pastures-new-an-alternate-approach-for-implant-design-644611c526ca
SO-CON 2024 Presentation Archive
https://github.com/SpecterOps/presentations/tree/master/SO-CON%202024
https://github.com/SpecterOps/presentations/tree/master/SO-CON%202024
asploit: One line command and control backdoors for APIs and web applications
https://github.com/Geeoon/asploit
https://github.com/Geeoon/asploit
HttpRemotingObjRefLeak: Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting
https://github.com/codewhitesec/HttpRemotingObjRefLeak
https://github.com/codewhitesec/HttpRemotingObjRefLeak
Human 1 - sqlmap 0 :
defeating automation through manual exploitation
https://hackcommander.github.io/posts/2024/03/19/human-1-sqlmap-0-defeating-automation-through-manual-exploitation
defeating automation through manual exploitation
https://hackcommander.github.io/posts/2024/03/19/human-1-sqlmap-0-defeating-automation-through-manual-exploitation
Android Jetpack Navigation: Deep Links Handling Exploitation
https://swarm.ptsecurity.com/android-jetpack-navigation-deep-links-handling-exploitation
https://swarm.ptsecurity.com/android-jetpack-navigation-deep-links-handling-exploitation
Abusing the DHCP Administrators Group to Escalate Privileges in Windows Domains
https://www.akamai.com/blog/security-research/abusing-dhcp-administrators-group-for-privilege-escalation-in-windows-domains
https://www.akamai.com/blog/security-research/abusing-dhcp-administrators-group-for-privilege-escalation-in-windows-domains
Making desync attacks easy with TRACE
https://portswigger.net/research/trace-desync-attack
https://portswigger.net/research/trace-desync-attack
Pwned by the Mail Carrier
https://posts.specterops.io/pwned-by-the-mail-carrier-0750edfad43b
https://posts.specterops.io/pwned-by-the-mail-carrier-0750edfad43b
ADPT: Another Dll Proxying Tool is exactly what it sounds like, another tool that allows you to automate the exploitation of dll hijack/sideloading opportunities
https://github.com/Kudaes/ADPT
https://github.com/Kudaes/ADPT
nimvoke: Indirect syscalls + DInvoke made simple
https://github.com/nbaertsch/nimvoke
https://github.com/nbaertsch/nimvoke
Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation (CVE-2023-36424)
https://github.com/Nassim-Asrir/CVE-2023-36424
Fortinet FortiClient EMS SQL Injection
https://github.com/horizon3ai/CVE-2023-48788
https://github.com/Nassim-Asrir/CVE-2023-36424
Fortinet FortiClient EMS SQL Injection
https://github.com/horizon3ai/CVE-2023-48788
Hacking Anything LLM via Reversing CVE’s(Duplicates)
https://basu-banakar.medium.com/hacking-anything-llm-via-reversing-cves-duplicates-4fbfde67463f
https://basu-banakar.medium.com/hacking-anything-llm-via-reversing-cves-duplicates-4fbfde67463f
Fake-SMS: How Deep Does the Rabbit Hole Really Go?
https://medium.com/@aleksamajkic/fake-sms-how-deep-does-the-rabbit-hole-really-go-17e25c42f986
https://medium.com/@aleksamajkic/fake-sms-how-deep-does-the-rabbit-hole-really-go-17e25c42f986
Perfect DLL Proxying using forwards with absolute paths
https://github.com/mrexodia/perfect-dll-proxy
https://github.com/mrexodia/perfect-dll-proxy
Project that generates Malicious Office Macro Enabled Dropper for DLL SideLoading and Embed it in Lnk file to bypass MOTW
https://github.com/SaadAhla/dropper
https://github.com/SaadAhla/dropper
Shellcode Loader is a common technique used to load malicious code into the target system's memory and execute them, often as part of malware
https://github.com/Cherno-x/MyShellcodeLoader
https://github.com/Cherno-x/MyShellcodeLoader
PoC Anti-Rootkit to uncover Windows Drivers/Rootkits mapped to Kernel Memory
https://github.com/eversinc33/unKover
https://github.com/eversinc33/unKover
Proof of Concept script to exploit the authenticated SSTI+RCE in Grav CMS (CVE-2024-28116)
https://github.com/akabe1/Graver
https://github.com/akabe1/Graver