A script to automate privilege escalation with CVE-2023-22809 vulnerability
https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc
https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc
GitHub
GitHub - n3m1sys/CVE-2023-22809-sudoedit-privesc: A script to automate privilege escalation with CVE-2023-22809 vulnerability
A script to automate privilege escalation with CVE-2023-22809 vulnerability - n3m1sys/CVE-2023-22809-sudoedit-privesc
qscan - Quick Network Scanner
https://github.com/0xor0ne/qscan
+ its companion command line tool qsc:
https://github.com/0xor0ne/qscan/tree/main/qsc
https://github.com/0xor0ne/qscan
+ its companion command line tool qsc:
https://github.com/0xor0ne/qscan/tree/main/qsc
GitHub
GitHub - 0xor0ne/qscan: Quick network scanner library. https://crates.io/crates/qscan
Quick network scanner library. https://crates.io/crates/qscan - 0xor0ne/qscan
LinWinPwn - Active Directory Vulnerability Scanner.
Scan with the help of impacket, bloodhound, crackmapexec, ldapdomaindump, lsassy, smbmap, kerbrute, adidnsdump, and more.
#AD #scan #windows
https://github.com/lefayjey/linWinPwn
Scan with the help of impacket, bloodhound, crackmapexec, ldapdomaindump, lsassy, smbmap, kerbrute, adidnsdump, and more.
#AD #scan #windows
https://github.com/lefayjey/linWinPwn
GitHub
GitHub - lefayjey/linWinPwn: linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools - lefayjey/linWinPwn
exploit.sh
1.1 KB
Script for automation of exploitation CVE-2023-22809 vulnerability to gain a root shell.
The script checks if the current user has access to run the sudoedit or sudo -e command for some file with root privileges. If it does it opens the sudoers file for the attacker to introduce the privilege escalation policy for the current user and get a root shell.
The script checks if the current user has access to run the sudoedit or sudo -e command for some file with root privileges. If it does it opens the sudoers file for the attacker to introduce the privilege escalation policy for the current user and get a root shell.
Linux Kernel Defence Map (v.5.13)
shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
https://github.com/a13xp0p0v/linux-kernel-defence-map
shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
https://github.com/a13xp0p0v/linux-kernel-defence-map
GitHub
GitHub - a13xp0p0v/linux-kernel-defence-map: Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation…
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies - a13xp0p0v/linux-kernel-defence-map
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
https://github.com/machine1337/gmailc2
https://github.com/machine1337/gmailc2
GitHub
GitHub - root4031/gmailc2: A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and…
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions - root4031/gmailc2
A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls
https://github.com/OmriBaso/RToolZ
https://github.com/OmriBaso/RToolZ
GitHub
GitHub - OmriBaso/RToolZ: A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.
A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls. - OmriBaso/RToolZ
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/hacksysteam/CVE-2023-21608
https://github.com/hacksysteam/CVE-2023-21608
GitHub
GitHub - hacksysteam/CVE-2023-21608: Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit - hacksysteam/CVE-2023-21608
👍3
This map lists the essential techniques to bypass anti-virus and EDR
https://github.com/CMEPW/BypassAV
https://github.com/CMEPW/BypassAV
GitHub
GitHub - matro7sh/BypassAV: This map lists the essential techniques to bypass anti-virus and EDR
This map lists the essential techniques to bypass anti-virus and EDR - matro7sh/BypassAV
❤4👍1
Network_Pentesting_Mindmap.pdf
11.7 MB
#Infographics
"Network Nightmare" Mindmap, 2023.
// It is a mindmap for conducting network attacks. It will be useful to pentesters/red team operators
"Network Nightmare" Mindmap, 2023.
// It is a mindmap for conducting network attacks. It will be useful to pentesters/red team operators
👍2
#Fuzzing
1. Firefly - smart black-box fuzzer for WebApp testing
https://blog.yeswehack.com/yeswerhackers/firefly-smart-black-box-fuzzer-web-applications
2. WEB API fuzzing
https://github.com/vulntinker/FUA
1. Firefly - smart black-box fuzzer for WebApp testing
https://blog.yeswehack.com/yeswerhackers/firefly-smart-black-box-fuzzer-web-applications
2. WEB API fuzzing
https://github.com/vulntinker/FUA
YesWeHack
YesWeHack Blog | Cybersecurity Insights and Bug Bounty Trends
Explore bug bounty insights on the YesWeHack Blog. Stay updated with vulnerability disclosure trends, hacker stories, and tips to excel in bug bounty programs.
Gitlab_Security_Audit.pdf
466 KB
"Source Code Audit on Git for Open Source Technology Improvement Fund (OSTIF)", 2023.
100 Red Team Projects for Pentesters and Network Managers
https://github.com/kurogai/100-redteam-projects/blob/master/README.md
https://github.com/kurogai/100-redteam-projects/blob/master/README.md
GitHub
100-redteam-projects/README.md at master · kurogai/100-redteam-projects
Projects for security students. Contribute to kurogai/100-redteam-projects development by creating an account on GitHub.
Rustproofing Linux
Part 1 - Leaking Addresses:
https://research.nccgroup.com/2023/02/06/rustproofing-linux-part-1-4-leaking-addresses
Porting Linux Kernel Bugs to Rust:
https://github.com/nccgroup/rustproofing-linux
Part 2 - Race Conditions:
https://research.nccgroup.com/2023/02/08/rustproofing-linux-part-2-4-race-conditions
Part 3 - Integer Overflows:
https://research.nccgroup.com/2023/02/14/rustproofing-linux-part-3-4-integer-overflows
PoC, which guards against copying the full 4GB+ of data: https://github.com/nccgroup/rustproofing-linux/blob/main/poc/poc_vuln_int_ovf.c
Part 4 - Shared Memory:
https://research.nccgroup.com/2023/02/16/rustproofing-linux-part-4-4-shared-memory
Part 1 - Leaking Addresses:
https://research.nccgroup.com/2023/02/06/rustproofing-linux-part-1-4-leaking-addresses
Porting Linux Kernel Bugs to Rust:
https://github.com/nccgroup/rustproofing-linux
Part 2 - Race Conditions:
https://research.nccgroup.com/2023/02/08/rustproofing-linux-part-2-4-race-conditions
Part 3 - Integer Overflows:
https://research.nccgroup.com/2023/02/14/rustproofing-linux-part-3-4-integer-overflows
PoC, which guards against copying the full 4GB+ of data: https://github.com/nccgroup/rustproofing-linux/blob/main/poc/poc_vuln_int_ovf.c
Part 4 - Shared Memory:
https://research.nccgroup.com/2023/02/16/rustproofing-linux-part-4-4-shared-memory
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
👍2
Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
https://securityintelligence.com/posts/direct-kernel-object-manipulation-attacks-etw-providers
https://securityintelligence.com/posts/direct-kernel-object-manipulation-attacks-etw-providers
Security Intelligence
Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
IBM Security X-Force Red offensive hackers analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities.
CVE-2022-39952:
Unauthenticated RCE in Fortinet FortiNAC
https://github.com/Florian-R0th/CVE-2022-39952
Unauthenticated RCE in Fortinet FortiNAC
https://github.com/Florian-R0th/CVE-2022-39952
CVE-2023-23752:
CMS Joomla - unauthorized access to webservice endpoints
https://github.com/WhiteOwl-Pub/CVE-2023-23752
CMS Joomla - unauthorized access to webservice endpoints
https://github.com/WhiteOwl-Pub/CVE-2023-23752