#OWASP Top 10
for Large Language Model Applications
https://hadess.io/owasp-top-10-for-large-language-model-applications
for Large Language Model Applications
https://hadess.io/owasp-top-10-for-large-language-model-applications
HADESS
OWASP In Cyber Security 2023 | Top 10 For LLM Applications - HADESS
In this article, we explored the concept of OWASP in cyber security. We have explained the reason for using it in 2023.
HackBrowserData - CLI tool for decrypting/exporting browser data (passwords, history, cookies, bookmarks, credit cards, download records, localStorage and extension) from the browser
https://github.com/moonD4rk/HackBrowserData
https://github.com/moonD4rk/HackBrowserData
GitHub
GitHub - moonD4rk/HackBrowserData: Extract and decrypt browser data, supporting multiple data types, runnable on various operating…
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux). - moonD4rk/HackBrowserData
❤1
Details of a critical TCP/IP RCE (CVE-2023-23416)
https://fieldeffect.com/blog/cve-analysis-red-october-one-ping-too-many
https://fieldeffect.com/blog/cve-analysis-red-october-one-ping-too-many
Fieldeffect
[CVE Analysis] Red October: One Ping Too Many
Erik Egsgard explains CVE-2023-21688, CVE-2023-23415, and CVE-2023-23416—three security vulnerabilities he discovered within the Windows operating system.
❤1
Bypassing Defender with ThreatCheck & Ghidra
https://offensivedefence.co.uk/posts/threatcheck-ghidra
https://offensivedefence.co.uk/posts/threatcheck-ghidra
offensivedefence.co.uk
Bypassing Defender with ThreatCheck & Ghidra
Intro It should come as no surprise when payloads generated in their default state get swallowed up by Defender, as Microsoft have both the means and motivation to proactively produce signatures for open and closed source/commericial tooling. One tactic to…
Fuzzing Android Native libraries with libFuzzer + QEMU
https://fuzzing.science/blog/Fuzzing-Android-Native-libraries-with-libFuzzer-Qemu
https://fuzzing.science/blog/Fuzzing-Android-Native-libraries-with-libFuzzer-Qemu
👍1
CVE-2023-34362:
MOVEIt Transfer RCE
Part1: https://blog.assetnote.io/2023/06/07/moveit-transfer-patch-diff-adventure
Part 2: https://blog.assetnote.io/2023/06/13/moveit-transfer-part-two
MOVEIt Transfer RCE
Part1: https://blog.assetnote.io/2023/06/07/moveit-transfer-patch-diff-adventure
Part 2: https://blog.assetnote.io/2023/06/13/moveit-transfer-part-two
👍1
Pentration Testing, Beginners To Expert!
https://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes
https://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes
GitHub
GitHub - xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes: A comprehensive guide for web application penetration…
A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities. - xalgord/Massive-...
👍3
Writing Windows Kernel Drivers for Advanced Persistence
Part 1: https://v3ded.github.io/redteam/red-team-tactics-writing-windows-kernel-drivers-for-advanced-persistence-part-1
Part 2: https://v3ded.github.io/redteam/red-team-tactics-writing-windows-kernel-drivers-for-advanced-persistence-part-2
Part 1: https://v3ded.github.io/redteam/red-team-tactics-writing-windows-kernel-drivers-for-advanced-persistence-part-1
Part 2: https://v3ded.github.io/redteam/red-team-tactics-writing-windows-kernel-drivers-for-advanced-persistence-part-2
v3ded.github.io
Red Team Tactics: Writing Windows Kernel Drivers for Advanced Persistence (Part 1)
Introduction This post, as indicated by the title, will cover the topic of writing Windows kernel drivers for advanced persistence. Because the subject matte...
The art of fuzzing: Windows Binaries
https://bushido-sec.com/index.php/2023/06/25/the-art-of-fuzzing-windows-binaries/
https://bushido-sec.com/index.php/2023/06/25/the-art-of-fuzzing-windows-binaries/
Bushido Security
The art of fuzzing: Windows Binaries - Bushido Security
This article delves into the concept of grey-box fuzzing, focusing on testing closed-source Windows binaries. Grey-box fuzzing allows vulnerability researchers to discover undiscovered vulnerabilities by fuzzing targets without having access to their source…
CVE-2023-32031 : MS Exchange PowerShell backend - Remote Code Execution
https://littlepwner.github.io/posts/cve-2023-32031-ms-exchange-powershell-backend-rce/
https://www.zerodayinitiative.com/blog/2022/11/14/control-your-types-or-get-pwned-remote-code-execution-in-exchange-powershell-backend
https://littlepwner.github.io/posts/cve-2023-32031-ms-exchange-powershell-backend-rce/
https://www.zerodayinitiative.com/blog/2022/11/14/control-your-types-or-get-pwned-remote-code-execution-in-exchange-powershell-backend
LDAP Queries for Offensive and Defensive Operations
https://www.politoinc.com/post/ldap-queries-for-offensive-and-defensive-operations
https://www.politoinc.com/post/ldap-queries-for-offensive-and-defensive-operations
Polito, Inc.
LDAP Queries for Offensive and Defensive Operations
The intention of this post is to provide basic queries for targeted AD DS information gathering used in penetration testing. The reader can
Cerez - A simple LD_PRELOAD rootkit
Features
✔ Hidden in the process list
✔ Hidden in the file system
✔ Unreadable
✔ Undeleteable
✔ Unwriteable
❌ Hidden in the network list (WIP)
https://github.com/StayBeautiful-collab/cerez
Features
✔ Hidden in the process list
✔ Hidden in the file system
✔ Unreadable
✔ Undeleteable
✔ Unwriteable
❌ Hidden in the network list (WIP)
https://github.com/StayBeautiful-collab/cerez