Hacking Brasil
240 subscribers
74 photos
21 videos
20 files
219 links
Think correctly about hacking!
By: @hxcking
Download Telegram
Kaspersky TDSSKiller abuse to disable EDR software

You can abuse TDSSKiller to interact with kernel-level services to disable EDR software running on the machine.
 
Removal of Malwarebytes Anti-Malware Service:
tdsskiller.exe -dcsvc MBAMService 

Removal of Microsoft Defender:
tdsskiller.exe -dcsvc windefend 

The "-dcsvc <service_name>" command deletes the specified service, removing the registry keys and executables associated with the service and software.

https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/lockbit-ransomware-silently-disables-edr-using-tdsskiller

https://www.threatdown.com/blog/new-ransomhub-attack-uses-tdskiller-and-lazagne-disables-edr/
Leaked Wallpaper

This is a privilege escalation tool (fixed with CVE-2024-38100 in KB5040434) that allows us to leak a user's NetNTLM hash from any session on the computer, even if we are working from a low-privileged user.
https://github.com/MzHmO/LeakedWallpaper
PoC Exploit for Windows 0-Day Flaws CVE-2024-38202 and CVE-2024-21302 Released:
https://securityonline.info/poc-exploit-for-windows-0-day-flaws-cve-2024-38202-and-cve-2024-21302-released/
Estou publicando um curso de Flipper Zero no YouTube e conto com o apoio de vocês para poder trazer outros projetos futuramente. Curtam os vídeos e se inscrevam, ajudará bastante o canal.

https://www.youtube.com/playlist?list=PLDCjkmO5apxafYqY1JJEtMe186HK6ksN8
Forwarded from Jame Time
IDAPro_9.0_Setup_&_Crack.7z
450.7 MB
USEM SEMPRE EM MÁQUINAS VIRTUAIS
Forwarded from Jame Time
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms (2024)
Forwarded from Jame Time
Linux for Pentesting & Bug Bounties

Informações: https://hacktify.thinkific.com/courses/linux-for-pentesting-bug-bounties
photo_2024-07-31_08-39-43.jpg
145.9 KB
🚀 List of Bug Bounty Commands
Forwarded from Jame Time
Drone Wi-Fi Hacking (W33)

@hacking_bra
Exploit for Windows Kernel-Mode Driver Elevation of Privilege Flaw (CVE-2024-35250)

The vulnerability lies within the handling of property requests in the ks.sys driver. Specifically, when the KSPROPERTY_TYPE_UNSERIALIZESET flag is provided, a series of operations can be initiated that ultimately lead to arbitrary IOCTL calls. During this process, the user-supplied buffer is copied into a newly allocated space and executed without proper validation.
Cracking Windows Kernel with HEVD

🔗 Link - Part 0
🔗 Link - Part 1
🔗 Link - Part 2
🔗 Link - Part 3
🔗 Link - Part 4
Linux Malware Development:
Создание reverse shell на основе TLS/SSL на Python
*
writeUP
*
source: reverse_ssl.py