C# implementation of the token privilege removal flaw discovered by: GabrielLandau / Elastic
https://github.com/MartinIngesen/TokenStomp
https://github.com/MartinIngesen/TokenStomp
Emerging Threat of Containerized Malware
https://github.com/mgeeky/PackMyPayload
High speed passive DNS collector with dnstap support, dns traffic sniffer and more
https://github.com/dmachard/dns-collector
https://github.com/mgeeky/PackMyPayload
High speed passive DNS collector with dnstap support, dns traffic sniffer and more
https://github.com/dmachard/dns-collector
Red Team Resources
https://github.com/Digit4lBytes/RedTeam
Advanced-Process-Injection-Workshop by CyberWarFare Labs
https://github.com/RedTeamOperations/Advanced-Process-Injection-Workshop
https://github.com/Digit4lBytes/RedTeam
Advanced-Process-Injection-Workshop by CyberWarFare Labs
https://github.com/RedTeamOperations/Advanced-Process-Injection-Workshop
A story of leaking uninitialized memory from Fastly
https://medium.com/@emil.lerner/leaking-uninitialized-memory-from-fastly-83327bcbee1f
Exploring UNIX pipes for iOS kernel exploit primitives, and introducing kalloc_data_require
https://tfp0labs.com/blog/unix-pipes-exploitation
https://medium.com/@emil.lerner/leaking-uninitialized-memory-from-fastly-83327bcbee1f
Exploring UNIX pipes for iOS kernel exploit primitives, and introducing kalloc_data_require
https://tfp0labs.com/blog/unix-pipes-exploitation
Beaconfuzz_OffensiveCon2022_patrick_ventuzelo.pdf
3.4 MB
A Journey into Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery
https://fuzzinglabs.com/wp-content/uploads/2022/02/Beaconfuzz_OffensiveCon2022_patrick_ventuzelo.pdf
https://fuzzinglabs.com/wp-content/uploads/2022/02/Beaconfuzz_OffensiveCon2022_patrick_ventuzelo.pdf
offensivecon_22_attacking_javascript_engines.pdf
923.7 KB
Attacking JavaScript Engines in 2022
https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf
https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf
Qbot only 30 minutes to steal credentials
https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it
https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it
PrivateLoader spreads Smokeloader, Redline, Vidar malware
https://intel471.com/blog/privateloader-malware
https://intel471.com/blog/privateloader-malware
PoC CVE-2022-22718 Windows Print Spooler Elevation of Privilege Vulnerability LPE
https://github.com/ly4k/SpoolFool
https://github.com/ly4k/SpoolFool
CVE-2022-20699 Cisco Anyconnect VPN unauth RCE (rwx stack)
https://github.com/Audiobahn/CVE-2022-20699
PoC CVE-2022-21241 CSV+ 0.8.0 - Arbitrary Code Execution
https://github.com/satoki/csv-plus_vulnerability
PoC CVE-2022-21877 information leak inside the spaceport.sys driver
https://github.com/Big5-sec/cve-2022-21877
https://github.com/Audiobahn/CVE-2022-20699
PoC CVE-2022-21241 CSV+ 0.8.0 - Arbitrary Code Execution
https://github.com/satoki/csv-plus_vulnerability
PoC CVE-2022-21877 information leak inside the spaceport.sys driver
https://github.com/Big5-sec/cve-2022-21877
An analysis of CVE-2022-21877
https://big5-sec.github.io/posts/an-analysis-of-cve-2022-21877
Exploring Windows UAC Bypasses
https://elastic.github.io/security-research/whitepapers/2022/02/03.exploring-windows-uac-bypass-techniques-detection-strategies/article
https://big5-sec.github.io/posts/an-analysis-of-cve-2022-21877
Exploring Windows UAC Bypasses
https://elastic.github.io/security-research/whitepapers/2022/02/03.exploring-windows-uac-bypass-techniques-detection-strategies/article
PPE - Poisoned Pipeline Execution
Running malicious code in your CI, without access to your CI
https://medium.com/cider-sec/ppe-poisoned-pipeline-execution-34f4e8d0d4e9
How Docker Made Me More Capable and the Host Less Secure
https://www.cyberark.com/resources/threat-research-blog/how-docker-made-me-more-capable-and-the-host-less-secure
Running malicious code in your CI, without access to your CI
https://medium.com/cider-sec/ppe-poisoned-pipeline-execution-34f4e8d0d4e9
How Docker Made Me More Capable and the Host Less Secure
https://www.cyberark.com/resources/threat-research-blog/how-docker-made-me-more-capable-and-the-host-less-secure
Bypass Windows Defender, Using ThreadStackSpoofer, TDP && KCTHijack
https://gitlab.com/ORCA666/3in1
Injecting shellcode into 'ntdll.dll' address space in target process, and hijacking its thread without calling GetThreadContext, evading memory scanners
https://gitlab.com/ORCA666/snaploader
https://gitlab.com/ORCA666/3in1
Injecting shellcode into 'ntdll.dll' address space in target process, and hijacking its thread without calling GetThreadContext, evading memory scanners
https://gitlab.com/ORCA666/snaploader
Real World 0-days.pdf
2 MB
0-days Detected In-the-Wild in 2021
https://github.com/maddiestone/ConPresentations/raw/master/OffensiveCon2022.RealWorld0days.pdf
https://github.com/maddiestone/ConPresentations/raw/master/OffensiveCon2022.RealWorld0days.pdf
OnlyRAT to remotely command and control windows computers
https://github.com/CosmodiumCS/OnlyRAT
Anonymously Reverse shell over Tor Network using Hidden Services without portfortwarding
https://github.com/samet-g/tornado
Rat tool coded in python with C&C which can accept multiple connections from clients
https://github.com/youhacker55/jarbou3
https://github.com/CosmodiumCS/OnlyRAT
Anonymously Reverse shell over Tor Network using Hidden Services without portfortwarding
https://github.com/samet-g/tornado
Rat tool coded in python with C&C which can accept multiple connections from clients
https://github.com/youhacker55/jarbou3
A Ruby GUI based on advanced rogue AP attack
https://github.com/Koala633/hostbase
Search WiFi geolocation data by BSSID and SSID on different public databases
https://github.com/GONZOsint/geowifi
https://github.com/Koala633/hostbase
Search WiFi geolocation data by BSSID and SSID on different public databases
https://github.com/GONZOsint/geowifi
Top 10 Web Hacking Techniques of 2021
https://portswigger.net/research/top-10-web-hacking-techniques-of-2021
https://portswigger.net/research/top-10-web-hacking-techniques-of-2021
Simple Process Injection in C#
https://github.com/sbasu7241/HellsGate
Interactive Binary Patching Plugin for IDA Pro
https://github.com/gaasedelen/patching
https://github.com/sbasu7241/HellsGate
Interactive Binary Patching Plugin for IDA Pro
https://github.com/gaasedelen/patching