Scour - AWS Exploitation Framework
https://github.com/grines/scour
onaws is a simple tool to check if an IP/hostname belongs to the AWS IP space or not. It uses the AWS IP address ranges data published by AWS to perform the search.
https://github.com/amalmurali47/onaws
Lightspin AWS IAM Vulnerability Scanner
https://github.com/lightspin-tech/red-shadow
#AWS #Explotation #Framework
Invoke-DNSteal is a Simple & Customizable DNS Data Exfiltrator.
https://github.com/JoelGMSec/Invoke-DNSteal
Exfiltrator یا Covert channel
روش هایی جهت انتقال اطلاعات به بیرون از شبکه می باشند و برای دور زدن فایروال DLP استفاده می شوند.
اطلاعات بیشتر:
https://en.wikipedia.org/wiki/Covert_channel
https://attack.mitre.org/tactics/TA0010/
#Exfiltration #Covertchannel #DNS
Brute Ratel v0.5.0 (Syndicate) is now available for download and provides a major update towards several features and the user interface of Brute Ratel. Commander comes with a new user interface providing a much more granular information on the metadata of the C4 features which can be seen in the figure below.
New Shellcode and DLL Loader
PowerShell Payload
Windows Remote Management (WinRM) Pivoting
Windows Management Instrumentation Queries and Pivots
LDAP Sentinel Re-Write and Raw Queries
Mimikatz
DCSync
Share Enumeration
AMSI and ETW Patching
Click Scripting and Automation
Commander
https://bruteratel.com/release/2021/07/03/Release-Syndicate/
#PostExploit #BRc4
Reverse Engineers' Hex Editor

Large (1TB+) file support
Decoding of integer/floating point value types
Inline disassembly of machine code
Highlighting and annotation of ranges of bytes
Side by side comparision of selections
Lua scripting support
Virtual address mapping support
https://github.com/solemnwarning/rehex
Sharperner - Simple Executable Generator With Encrypted Shellcode
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass signature check but I cant be sure it can bypass heuristic scanning.
https://github.com/aniqfakhrul/Sharperner
#redteaming
ورژن جدید mimikatz منتشر شد برای بعد از اپدیت جدید🔓
پ.ن :مایکروسافت اپدیت که داده فقط برای rce هست و LPE بعد اپدیت هم کار میکند
https://github.com/gentilkiwi/mimikatz/releases
#printnightmare
Media is too big
VIEW IN TELEGRAM
https://www.youtube.com/watch?v=kO_um6uWEZ4

https://www.clubhouse.com/join/penetercom/dU4Ss8mT/M43qzGYk
شنبه ۱۹ تیر روی اسیب پذیری صحبت میکنیم و همچنین روش های mitigation
ساعت ۲۳ به وقت ایران
#printnightmare
In May of 2021, Microsoft released a patch to correct CVE-2021-28474, a remote code execution bug in supported versions of Microsoft SharePoint Server.
https://www.zerodayinitiative.com/blog/2021/7/7/cve-2021-28474-sharepoint-remote-code-execution-via-server-side-control-interpretation-conflict
SoheilSec
Microsoft: PrintNightmare security updates work, start patching! توضیحات مایکروسافت در مورد پچ قابل بایپس https://www.bleepingcomputer.com/news/security/microsoft-printnightmare-security-updates-work-start-patching/amp/?__twitter_impression=true #printnightmare
Benjamin Delpy :
Clarified Guidance for CVE-2021-34527 #printnightmare So I presume all is OK, and:
- you will not change UNC path detection
-RestrictDriverInstallation To Administrators & driver no exploitation? It's not, and you know it
===
As I test it LPE work after Patch deploy it so for apply patch u should follow Microsoft steps and change the registry.
طبق تستی که بعد از نصب پچ انجام دادم اکسپلویت کار میکنه و شما باید حتما تغییرات در رجیستری که مایکروسافت گفته انجام بدید.
https://lnkd.in/eJYGz6P
https://lnkd.in/eW-UWGi
#infosec #0day #microsoft #OOB #printspooler
UDP Technology IP Camera vulnerabilities
آسیب پذیری های روی سری دوربین های UDP technology
سری دوربین ها :

Geutebruck
Ganz
Visualint
Cap
THRIVE Intelligence
Sophus
VCA
TripCorps
Sprinx Technologies
Smartec
Riva

https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/
#RCE #IPCAMERA #udptechnology