Apache Superset Part II: RCE, Credential Harvesting and More
https://www.horizon3.ai/apache-superset-part-ii-rce-credential-harvesting-and-more/
https://www.horizon3.ai/apache-superset-part-ii-rce-credential-harvesting-and-more/
Horizon3.ai
Apache Superset Part II: RCE, Credential Harvesting and More
Apache Superset is a popular open source data exploration and visualization tool. In a previous post, we disclosed a vulnerability, CVE-2023-27524, affecting thousands of Superset servers on the Internet, that enables unauthorized attackers to gain admin…
👍1
Bypassing UAC with SSPI Datagram Contexts
https://splintercod3.blogspot.com/p/bypassing-uac-with-sspi-datagram.html
https://splintercod3.blogspot.com/p/bypassing-uac-with-sspi-datagram.html
Cracking the final frontier: Reverse engineering and exploiting low-earth orbit satellites
https://cfp.recon.cx/2023/talk/3NU9DB/
https://cfp.recon.cx/2023/talk/3NU9DB/
cfp.recon.cx
Cracking the final frontier: Reverse engineering and exploiting low-earth orbit satellites 2023
Satellites play an indispensable role in modern life, providing essential services such as telecommunications, global navigation, and earth observation. In recent years, we've seen an explosive growth in the number of satellites, primarily in the Low Earth…
An all-in-one hacking tool written in Python to remotely exploit Android devices using #ADB (Android Debug Bridge) and #Metasploit-Framework.
https://github.com/AzeemIdrisi/PhoneSploit-Pro
https://github.com/AzeemIdrisi/PhoneSploit-Pro
GitHub
GitHub - AzeemIdrisi/PhoneSploit-Pro: An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework…
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session. - AzeemIdrisi/PhoneSploit-Pro
🔥4
CVE-2023-29357
Microsoft SharePoint Server Elevation of Privilege Vulnerability
https://github.com/Chocapikk/CVE-2023-29357
Microsoft SharePoint Server Elevation of Privilege Vulnerability
https://github.com/Chocapikk/CVE-2023-29357
GitHub
GitHub - Chocapikk/CVE-2023-29357: Microsoft SharePoint Server Elevation of Privilege Vulnerability
Microsoft SharePoint Server Elevation of Privilege Vulnerability - Chocapikk/CVE-2023-29357
A Deep Dive into Brute Ratel C4 payloads – Part 2
https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads-part-2/
https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads-part-2/
👍1
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
graftcp can redirect the TCP connection made by the given program [application, script, shell, etc.] to SOCKS5 or HTTP proxy.
https://github.com/hmgle/graftcp
#tools
graftcp can redirect the TCP connection made by the given program [application, script, shell, etc.] to SOCKS5 or HTTP proxy.
https://github.com/hmgle/graftcp
#tools
GitHub
GitHub - hmgle/graftcp: A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy. - hmgle/graftcp
❤2
CVE-2023-29360
#Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
https://github.com/Nero22k/cve-2023-29360
#Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
https://github.com/Nero22k/cve-2023-29360
GitHub
GitHub - Nero22k/cve-2023-29360: Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver - Nero22k/cve-2023-29360
Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent
https://github.com/1N73LL1G3NC3x/Nightmangle
https://github.com/1N73LL1G3NC3x/Nightmangle
GitHub
GitHub - 1N73LL1G3NC3x/Nightmangle
Contribute to 1N73LL1G3NC3x/Nightmangle development by creating an account on GitHub.
🔥2
Coerced Potato New tool for local privilege escalation on a Windows machine, from a service account to NT SYSTEM. Should work on any recent versions of Windows.
https://github.com/hackvens/CoercedPotato
Research:
https://blog.hackvens.fr/articles/CoercedPotato.html
https://github.com/hackvens/CoercedPotato
Research:
https://blog.hackvens.fr/articles/CoercedPotato.html
GitHub
GitHub - hackvens/CoercedPotato
Contribute to hackvens/CoercedPotato development by creating an account on GitHub.
👎1
A repository of telemetry domains and URLs used by mobile location tracking and analytics libraries.
https://github.com/craiu/mobiletrackers
https://github.com/craiu/mobiletrackers
GitHub
GitHub - craiu/mobiletrackers: A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted…
A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads libraries. - craiu/mobiletrackers
Attacking the Android kernel using the Qualcomm TrustZone
https://tamirzb.com/attacking-android-kernel-using-qualcomm-trustzone
https://tamirzb.com/attacking-android-kernel-using-qualcomm-trustzone
Tamir Zahavi-Brunner’s Blog
Attacking the Android kernel using the Qualcomm TrustZone
In this post I describe a somewhat unique Android kernel exploit, which utilizes the TrustZone in order to compromise the kernel.