Making desync attacks easy with TRACE
https://portswigger.net/research/trace-desync-attack
https://portswigger.net/research/trace-desync-attack
Pwned by the Mail Carrier
https://posts.specterops.io/pwned-by-the-mail-carrier-0750edfad43b
https://posts.specterops.io/pwned-by-the-mail-carrier-0750edfad43b
ADPT: Another Dll Proxying Tool is exactly what it sounds like, another tool that allows you to automate the exploitation of dll hijack/sideloading opportunities
https://github.com/Kudaes/ADPT
https://github.com/Kudaes/ADPT
nimvoke: Indirect syscalls + DInvoke made simple
https://github.com/nbaertsch/nimvoke
https://github.com/nbaertsch/nimvoke
Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation (CVE-2023-36424)
https://github.com/Nassim-Asrir/CVE-2023-36424
Fortinet FortiClient EMS SQL Injection
https://github.com/horizon3ai/CVE-2023-48788
https://github.com/Nassim-Asrir/CVE-2023-36424
Fortinet FortiClient EMS SQL Injection
https://github.com/horizon3ai/CVE-2023-48788
Hacking Anything LLM via Reversing CVE’s(Duplicates)
https://basu-banakar.medium.com/hacking-anything-llm-via-reversing-cves-duplicates-4fbfde67463f
https://basu-banakar.medium.com/hacking-anything-llm-via-reversing-cves-duplicates-4fbfde67463f
Fake-SMS: How Deep Does the Rabbit Hole Really Go?
https://medium.com/@aleksamajkic/fake-sms-how-deep-does-the-rabbit-hole-really-go-17e25c42f986
https://medium.com/@aleksamajkic/fake-sms-how-deep-does-the-rabbit-hole-really-go-17e25c42f986
Perfect DLL Proxying using forwards with absolute paths
https://github.com/mrexodia/perfect-dll-proxy
https://github.com/mrexodia/perfect-dll-proxy
Project that generates Malicious Office Macro Enabled Dropper for DLL SideLoading and Embed it in Lnk file to bypass MOTW
https://github.com/SaadAhla/dropper
https://github.com/SaadAhla/dropper
Shellcode Loader is a common technique used to load malicious code into the target system's memory and execute them, often as part of malware
https://github.com/Cherno-x/MyShellcodeLoader
https://github.com/Cherno-x/MyShellcodeLoader
PoC Anti-Rootkit to uncover Windows Drivers/Rootkits mapped to Kernel Memory
https://github.com/eversinc33/unKover
https://github.com/eversinc33/unKover
Proof of Concept script to exploit the authenticated SSTI+RCE in Grav CMS (CVE-2024-28116)
https://github.com/akabe1/Graver
https://github.com/akabe1/Graver
Process Hypnosis: Debugger assisted control flow hijack
https://github.com/CarlosG13/Process-Hypnosis-Debugger-assisted-control-flow-hijack
https://github.com/CarlosG13/Process-Hypnosis-Debugger-assisted-control-flow-hijack
This script Crawls the website and finds the URLs that contain html forms
https://github.com/dirtycoder0124/formcrawler
https://github.com/dirtycoder0124/formcrawler
naively bypassing new memory scanning POCs
https://sillywa.re/posts/flower-da-flowin-shc
https://sillywa.re/posts/flower-da-flowin-shc
flower: a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor
https://github.com/xrombar/flower
https://github.com/xrombar/flower
Hacking the Giant: How I Discovered Google’s Vulnerability and Hall of Fame Recognition
https://medium.com/@hncaga/hacking-the-giant-how-i-discovered-googles-vulnerability-and-hall-of-fame-recognition-694a9c18684a
https://medium.com/@hncaga/hacking-the-giant-how-i-discovered-googles-vulnerability-and-hall-of-fame-recognition-694a9c18684a
Analyse, hunt and classify malware using .NET metadata
https://bartblaze.blogspot.com/2024/03/analyse-hunt-and-classify-malware-using.html
https://bartblaze.blogspot.com/2024/03/analyse-hunt-and-classify-malware-using.html
ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
https://www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild
https://www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild
Atexec-pro: Fileless atexec, no more need for port 445
https://github.com/Ridter/atexec-pro
https://github.com/Ridter/atexec-pro
CspReconGo: is a command-line tool designed for cybersecurity analysts, web developers, and IT professionals
https://github.com/jhaddix/CSPReconGO
https://github.com/jhaddix/CSPReconGO