Hacking Brasil
241 subscribers
74 photos
21 videos
20 files
219 links
Think correctly about hacking!
By: @hxcking
Download Telegram
MultiDump

This is a post-exploitation tool written in C for dumping and extracting LSASS memory discreetly. MultiDump supports LSASS dump via ProcDump.exe or Comsvc.dll, it offers two modes: a local mode that encrypts and stores the dump file locally, and a remote mode that sends the dump to a handler for decryption and analysis

https://github.com/Xre0uS/MultiDump
Infosec Awesome.

- Um repositório com vários materiais e ferramentas de segurança da informação. Você pode encontrar informações úteis para todos os gostos e cores:

Adversary Simulation & Emulation;
Application Security;
Binary Analysis;
Cloud Security;
Courses;
Cryptography;
Data Sets;
Digital Forensics and Incident Response;
Exploits;
Hardening;
Hardware;
Malware Analysis;
Mobile Security;
Network Security;
Open-source Intelligence (OSINT);
Password Cracking and Wordlists;
Social Engineering;
Smart Contract;
Vulnerable.


@hackingbra
Proof of Concept (PoC) for #CVE-2024-23334, demonstrating how #malicious actors can exploit vulnerabilities in aiohttp using #LFI .

https://github.com/jhonnybonny/CVE-2024-23334
Já adquiri meu brinquedinho 😅
#FlipperZero
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2024-1086 Linux kernel LPE

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.

A full write-up of the exploit - including background information and loads of useful diagrams - can be found in the Flipping Pages blogpost.
Windows Defender Killer | código em C++ para desabilitar permanentemente o Windows Defender através de chaves no registro.

https://github.com/S12cybersecurity/WinDefenderKiller
Low-Level x86-64 Architecture, Linking & Loading, Memory Management, etc...
from SANS sec660.4 (Exploiting Linux for Penetration Testers)
credit: Stephen Sims

https://www.youtube.com/watch?v=I37AJebKh2Y
Um aviso rápido pra quem utiliza o Kali Linux. Foi encontrado um backdoor no pacote xz da versão 5.6.0 até o 5.6.1. É recomendado instalar a atualização do pacote para corrigir essa vulnerabilidade, com o comando abaixo.

sudo apt install —only-upgrade liblzma5
Backdoor in upstream xz/liblzma leading to ssh server compromise

https://www.openwall.com/lists/oss-security/2024/03/29/4