Perfect DLL Proxying using forwards with absolute paths
https://github.com/mrexodia/perfect-dll-proxy
https://github.com/mrexodia/perfect-dll-proxy
Project that generates Malicious Office Macro Enabled Dropper for DLL SideLoading and Embed it in Lnk file to bypass MOTW
https://github.com/SaadAhla/dropper
https://github.com/SaadAhla/dropper
Shellcode Loader is a common technique used to load malicious code into the target system's memory and execute them, often as part of malware
https://github.com/Cherno-x/MyShellcodeLoader
https://github.com/Cherno-x/MyShellcodeLoader
PoC Anti-Rootkit to uncover Windows Drivers/Rootkits mapped to Kernel Memory
https://github.com/eversinc33/unKover
https://github.com/eversinc33/unKover
Proof of Concept script to exploit the authenticated SSTI+RCE in Grav CMS (CVE-2024-28116)
https://github.com/akabe1/Graver
https://github.com/akabe1/Graver
Process Hypnosis: Debugger assisted control flow hijack
https://github.com/CarlosG13/Process-Hypnosis-Debugger-assisted-control-flow-hijack
https://github.com/CarlosG13/Process-Hypnosis-Debugger-assisted-control-flow-hijack
This script Crawls the website and finds the URLs that contain html forms
https://github.com/dirtycoder0124/formcrawler
https://github.com/dirtycoder0124/formcrawler
naively bypassing new memory scanning POCs
https://sillywa.re/posts/flower-da-flowin-shc
https://sillywa.re/posts/flower-da-flowin-shc
flower: a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor
https://github.com/xrombar/flower
https://github.com/xrombar/flower
Hacking the Giant: How I Discovered Google’s Vulnerability and Hall of Fame Recognition
https://medium.com/@hncaga/hacking-the-giant-how-i-discovered-googles-vulnerability-and-hall-of-fame-recognition-694a9c18684a
https://medium.com/@hncaga/hacking-the-giant-how-i-discovered-googles-vulnerability-and-hall-of-fame-recognition-694a9c18684a
Analyse, hunt and classify malware using .NET metadata
https://bartblaze.blogspot.com/2024/03/analyse-hunt-and-classify-malware-using.html
https://bartblaze.blogspot.com/2024/03/analyse-hunt-and-classify-malware-using.html
ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
https://www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild
https://www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild
Atexec-pro: Fileless atexec, no more need for port 445
https://github.com/Ridter/atexec-pro
https://github.com/Ridter/atexec-pro
CspReconGo: is a command-line tool designed for cybersecurity analysts, web developers, and IT professionals
https://github.com/jhaddix/CSPReconGO
https://github.com/jhaddix/CSPReconGO
CVE-2024-1086 Linux kernel LPE
https://github.com/notselwyn/cve-2024-1086
SharePoint not so 0day
https://github.com/testanull/SharePoint-not-so-0day
https://github.com/notselwyn/cve-2024-1086
SharePoint not so 0day
https://github.com/testanull/SharePoint-not-so-0day
Abusing MiniFilter Altitude to blind EDR
https://tierzerosecurity.co.nz/2024/03/27/blind-edr.html
https://tierzerosecurity.co.nz/2024/03/27/blind-edr.html
Leak NTLM via Website tab in teams via MS Office
https://github.com/soufianetahiri/TeamsNTLMLeak
https://github.com/soufianetahiri/TeamsNTLMLeak
Kerberos II - Credential Access
part1: https://labs.lares.com/fear-kerberos-pt1
part2: https://labs.lares.com/fear-kerberos-pt2
part1: https://labs.lares.com/fear-kerberos-pt1
part2: https://labs.lares.com/fear-kerberos-pt2
Bash Injection Without Alphabets | picoCTF 2024 Writeup
https://me-ankeet.medium.com/bash-injection-without-alphabets-picoctf-2024-writeup-sansalpha-be70a37ce6eb
https://me-ankeet.medium.com/bash-injection-without-alphabets-picoctf-2024-writeup-sansalpha-be70a37ce6eb
ChaiLdr: AV Evasive Payload Loader
AV bypass while you sip your Chai!
https://github.com/Cipher7/ChaiLdr
AV bypass while you sip your Chai!
https://github.com/Cipher7/ChaiLdr