Assembly for Hackers
"Assembly Unleashed: A Hacker's Handbook" is a definitive resource tailored specifically for hackers and security researchers seeking to master the art of assembly programming language. Authored by seasoned practitioners in the field, this book offers a comprehensive journey into the depths of assembly, unraveling its complexities and exposing its potential for exploitation and defense.
Source:
https://redteamrecipe.com/assembly-for-hackers
"Assembly Unleashed: A Hacker's Handbook" is a definitive resource tailored specifically for hackers and security researchers seeking to master the art of assembly programming language. Authored by seasoned practitioners in the field, this book offers a comprehensive journey into the depths of assembly, unraveling its complexities and exposing its potential for exploitation and defense.
Source:
https://redteamrecipe.com/assembly-for-hackers
CVE-2024-30103: Critical Microsoft Outlook Zero-Click RCE Flaw Executes as Email is Opened.
https://cybersecuritynews.com/microsoft-outlook-zero-click-rce-flaw/
https://cybersecuritynews.com/microsoft-outlook-zero-click-rce-flaw/
CVE-2024-28995: High-Severity Directory Traversal Vulnerability affecting SolarWinds Serv-U.
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
POC: https://github.com/rapid7/metasploit-framework/pull/19255
Query:
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
POC: https://github.com/rapid7/metasploit-framework/pull/19255
Query:
Hunter: protocol.banner="Serv-U FTP"
FOFA: app="SolarWinds-Serv-U-FTP"
SHODAN: product:"Serv-U ftpd"[OSEP-PEN300]-[2022]-offenseive_security_expert_penetration_tester
https://teraboxapp.com/s/1ukPQmfhzBxj6VnH5JwdXHg
https://teraboxapp.com/s/1ukPQmfhzBxj6VnH5JwdXHg
Computer Hacking Forensic Investigator Certification (CHFI) (Theory Based)
Course Links:
Part One:
https://drive.google.com/file/d/1n7PF9WNmC-6C4jGjlAYH0ZMwHz0N-q9h/view?usp=sharing
Part Two:
https://drive.google.com/file/d/1-OhDO7nnepI-PcaWa9uPXqzG5GPbgMvS/view?usp=sharing
Part Three:
https://drive.google.com/file/d/1setWYm95KGt3F4HW8d3psvFz5HExxHsh/view?usp=sharing
Course Links:
Part One:
https://drive.google.com/file/d/1n7PF9WNmC-6C4jGjlAYH0ZMwHz0N-q9h/view?usp=sharing
Part Two:
https://drive.google.com/file/d/1-OhDO7nnepI-PcaWa9uPXqzG5GPbgMvS/view?usp=sharing
Part Three:
https://drive.google.com/file/d/1setWYm95KGt3F4HW8d3psvFz5HExxHsh/view?usp=sharing
INE | eCPPT Penetration Testing Professional (NEW - 2024)
Download : https://1024terabox.com/s/1cVvLsmUf-Jb81Rawna24LQ
More info :https://security.ine.com/certifications/ecppt-certification/
Download : https://1024terabox.com/s/1cVvLsmUf-Jb81Rawna24LQ
More info :https://security.ine.com/certifications/ecppt-certification/
pcap-did-what: Analyze pcaps with Zeek and a Grafana Dashboard https://github.com/hackertarget/pcap-did-what
duck.ai
Uma ferramenta de comunicação com chatbots feita pela DuckDuckGo. Gratuito, não requer cadastro (posiciona-se como anônimo e não coleta esses usuários) e muito rápido:
Turbo GPT-3.5
Claude 4 Haiku
Liama 3 70B
Mixtral 8x78
Uma ferramenta de comunicação com chatbots feita pela DuckDuckGo. Gratuito, não requer cadastro (posiciona-se como anônimo e não coleta esses usuários) e muito rápido:
Turbo GPT-3.5
Claude 4 Haiku
Liama 3 70B
Mixtral 8x78
Persistence Techniques That Persist https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist
Cyberark
Persistence Techniques That Persist
Abstract Once threat actors gain a foothold on a system, they must implement techniques to maintain that access, even in the event of restarts, updates in credentials or any other type of change...
Fascinating C code: TCP sockets & HTTP file downloads using only ntdll exports (NtCreateFile & NtDeviceIoControlFile syscalls). Bypasses Winsock for low-level Windows networking.
https://www.x86matthew.com/view_post?id=ntsockets
https://www.x86matthew.com/view_post?id=ntsockets
Red Team Privilege Escalation
Part 1 - Writable SYSTEM Path Privilege Escalation
https://www.praetorian.com/blog/red-team-local-privilege-escalation-writable-system-path-privilege-escalation-part-1
Part 2 - RBCD Based Privilege Escalation
https://www.praetorian.com/blog/red-team-privilege-escalation-rbcd-based-privilege-escalation-part-2
Part 1 - Writable SYSTEM Path Privilege Escalation
https://www.praetorian.com/blog/red-team-local-privilege-escalation-writable-system-path-privilege-escalation-part-1
Part 2 - RBCD Based Privilege Escalation
https://www.praetorian.com/blog/red-team-privilege-escalation-rbcd-based-privilege-escalation-part-2
👍1
😈 RedTeam Story #1: XSS, LFI, Logrotate.
• MITRE ATT&CK Techniques and Tactics;
• Attack Context;
• Methodology;
• Evasion Mechanism;
• Goal;
• Exploitation of Website;
• Privilege Escalation and Lateral Movement;
• Post-Exploitation;
• Automation and Scripting;
• Persistence;
- MITRE ATT&CK Techniques and Tactics Sorted by Tactics;
- Attack Context;
• Scripting;
- Creating and Testing a Bash Reverse Shell;
- Verifying the Reverse Shell;
- Establishing a Reverse Shell Connection;
- Analyzing Root Crontab and Persistence Mechanisms;
— Reviewing Crontab;
— Root Reset Script;
— Log Rotation Configuration;
— Automated Root Login Script;
— Database Cleanup Script;
• Privilege Escalation;
• MITRE ATT&CK Techniques and Tactics;
• Attack Context;
• Methodology;
• Evasion Mechanism;
• Goal;
• Exploitation of Website;
• Privilege Escalation and Lateral Movement;
• Post-Exploitation;
• Automation and Scripting;
• Persistence;
- MITRE ATT&CK Techniques and Tactics Sorted by Tactics;
- Attack Context;
• Scripting;
- Creating and Testing a Bash Reverse Shell;
- Verifying the Reverse Shell;
- Establishing a Reverse Shell Connection;
- Analyzing Root Crontab and Persistence Mechanisms;
— Reviewing Crontab;
— Root Reset Script;
— Log Rotation Configuration;
— Automated Root Login Script;
— Database Cleanup Script;
• Privilege Escalation;
A Universal Windows Bootkit
An analysis of the MBR bootkit referred to as “HDRoot”
https://williamshowalter.com/a-universal-windows-bootkit/
An analysis of the MBR bootkit referred to as “HDRoot”
https://williamshowalter.com/a-universal-windows-bootkit/
𝗢𝗪𝗔𝗦𝗣 𝗧𝗢𝗣 𝟭𝟬 - 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗹𝗲 𝗟𝗟𝗠 𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀
The OWASP Top 10 for LLMs is a list of the most critical vulnerabilities found in applications utilizing LLMs. It was created to provide developers, data scientists, and security experts with practical, actionable, and concise security guidance to navigate the complex and evolving terrain of LLM security.
Link 🔗:-
https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/Vulnerable-LLM-Applications
The OWASP Top 10 for LLMs is a list of the most critical vulnerabilities found in applications utilizing LLMs. It was created to provide developers, data scientists, and security experts with practical, actionable, and concise security guidance to navigate the complex and evolving terrain of LLM security.
Link 🔗:-
https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/Vulnerable-LLM-Applications
This media is not supported in your browser
VIEW IN TELEGRAM
Bluetooth-DOS-Attack
Tool idea:
Make it mandatory for nearby Bluetooth-enabled devices to connect to nearby Bluetooth-enabled devices such as speakers and other things.
https://github.com/Yasher201/Bluetooth-DOS-Attack
Tool idea:
Make it mandatory for nearby Bluetooth-enabled devices to connect to nearby Bluetooth-enabled devices such as speakers and other things.
https://github.com/Yasher201/Bluetooth-DOS-Attack