Joern - Open-source code analysis platform for C/C++/Java/Binary/Javascript/Python/Kotlin based on code property graphs
https://github.com/joernio/joern
https://github.com/joernio/joern
GitHub
GitHub - joernio/joern: Open-source code analysis platform for C/C++/Java/Binary/Javascript/Python/Kotlin based on code property…
Open-source code analysis platform for C/C++/Java/Binary/Javascript/Python/Kotlin based on code property graphs. Discord https://discord.gg/vv4MH284Hc - joernio/joern
CVE-2022-37706:
A reliable exploit + write-up to elevate privileges to root (Ubuntu 22.04)
https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit
A reliable exploit + write-up to elevate privileges to root (Ubuntu 22.04)
https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit
GitHub
GitHub - MaherAzzouzi/CVE-2022-37706-LPE-exploit: A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu…
A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04) - MaherAzzouzi/CVE-2022-37706-LPE-exploit
👍1
Analyzing Golang Executables
https://www.pnfsoftware.com/blog/analyzing-golang-executables
https://www.pnfsoftware.com/blog/analyzing-golang-executables
CVE-2022-37706-LPE-exploit-main.zip
484.2 KB
CVE-2022-37706:
A reliable exploit + write-up to elevate privileges to root (Ubuntu 22.04)
https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit
A reliable exploit + write-up to elevate privileges to root (Ubuntu 22.04)
https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit
CrackMapExec - A swiss army knife for pentesting networks
https://github.com/Porchetta-Industries/CrackMapExec
https://github.com/Porchetta-Industries/CrackMapExec
GitHub
GitHub - byt3bl33d3r/CrackMapExec: A swiss army knife for pentesting networks
A swiss army knife for pentesting networks. Contribute to byt3bl33d3r/CrackMapExec development by creating an account on GitHub.
Static analysis tool based on clang, which detects source-to-binary information leaks in C/C++ projects
https://github.com/ergrelet/cpplumber
https://github.com/ergrelet/cpplumber
GitHub
GitHub - ergrelet/cpplumber: Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++…
Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects - ergrelet/cpplumber
JuicyPotato
https://github.com/antonioCoco/JuicyPotatoNG
research: https://decoder.cloud/2022/09/21/giving-juicypotato-a-second-chance-juicypotatong/
https://github.com/antonioCoco/JuicyPotatoNG
research: https://decoder.cloud/2022/09/21/giving-juicypotato-a-second-chance-juicypotatong/
GitHub
GitHub - antonioCoco/JuicyPotatoNG: Another Windows Local Privilege Escalation from Service Account to System
Another Windows Local Privilege Escalation from Service Account to System - GitHub - antonioCoco/JuicyPotatoNG: Another Windows Local Privilege Escalation from Service Account to System
Sacrificing Suspended Processes
https://www.optiv.com/insights/source-zero/blog/sacrificing-suspended-processes
payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods:
https://github.com/optiv/Freeze
https://www.optiv.com/insights/source-zero/blog/sacrificing-suspended-processes
payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods:
https://github.com/optiv/Freeze
Optiv
Sacrificing Suspended Processes
EDR hooking has become a major part of an adversary’s ability to successfully compromise an endpoint system. Hooking is a technique that alters the behavior of an application, allowing EDR tools to monitor the execution flow that occurs in a process, gather…
How To Attack Admin Panels Successfully
https://infosecwriteups.com/how-to-attack-admin-panels-successfully-72c90eeb818c
https://infosecwriteups.com/how-to-attack-admin-panels-successfully-72c90eeb818c
Medium
How To Attack Admin Panels Successfully
Attacking Web Apps Admin Panels The Right Way
👍1🔥1
Merlin - cross-platform post-exploitation HTTP/2 Command & Control server/agent (Go)
https://github.com/Ne0nd0g/merlin
https://github.com/Ne0nd0g/merlin
GitHub
GitHub - Ne0nd0g/merlin: Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. - Ne0nd0g/merlin
Attacking Encrypted HTTP Communications
https://www.pentestpartners.com/security-blog/attacking-encrypted-http-communications
https://www.pentestpartners.com/security-blog/attacking-encrypted-http-communications
Pen Test Partners
Attacking Encrypted HTTP Communications | Pen Test Partners
TL;DR The Reolink RLC-520A PoE camera obfuscates its HTTP communication by encrypting the POST body data. This level of security does defend against opportunistic attackers but falls short when defending against persistent attackers. Introduction Different…
1. Investigating Novel Malware Persistence Within ESXi Hypervisors
https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence
2. Detection and Hardening within ESXi Hypervisors
https://www.mandiant.com/resources/blog/esxi-hypervisors-detection-hardening
https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence
2. Detection and Hardening within ESXi Hypervisors
https://www.mandiant.com/resources/blog/esxi-hypervisors-detection-hardening
Google Cloud Blog
Malware Persistence Within ESXi Hypervisors | Malicious VIBs | Google Cloud Blog
Malware Persistence within ESXi Hypervisors. Learn how attackers use vSphere Installation Bundles ('VIBs") to install backdoors across ESXi hypervisors.
0-Day RCE on Microsoft Exchange Server
https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html
https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html
gteltsc.vn
WARNING: NEW ATTACK CAMPAIGN UTILIZED A NEW 0-DAY RCE VULNERABILITY ON MICROSOFT EXCHANGE SERVER
Circa the beginning of August 2022, while doing security monitoring & incident response services, GTSC SOC team discovered that a critical infrastructure
🔥2
CVE-2022-40140, CVE-2022-41082:
"ProxyNotShell"
https://github.com/L34ked/CVE-2022-41208
proxynotshell_checker.nse
https://github.com/CronUp/Vulnerabilidades/blob/main/proxynotshell_checker.nse
"ProxyNotShell"
https://github.com/L34ked/CVE-2022-41208
proxynotshell_checker.nse
https://github.com/CronUp/Vulnerabilidades/blob/main/proxynotshell_checker.nse
👍1
CVE-2022-40684:
Critical Authentication Bypass in FortiOS and FortiProxy
https://github.com/dickson0day/CVE-2022-40684
Critical Authentication Bypass in FortiOS and FortiProxy
https://github.com/dickson0day/CVE-2022-40684
👎2