Cracking the final frontier: Reverse engineering and exploiting low-earth orbit satellites
https://cfp.recon.cx/2023/talk/3NU9DB/
https://cfp.recon.cx/2023/talk/3NU9DB/
cfp.recon.cx
Cracking the final frontier: Reverse engineering and exploiting low-earth orbit satellites 2023
Satellites play an indispensable role in modern life, providing essential services such as telecommunications, global navigation, and earth observation. In recent years, we've seen an explosive growth in the number of satellites, primarily in the Low Earth…
An all-in-one hacking tool written in Python to remotely exploit Android devices using #ADB (Android Debug Bridge) and #Metasploit-Framework.
https://github.com/AzeemIdrisi/PhoneSploit-Pro
https://github.com/AzeemIdrisi/PhoneSploit-Pro
GitHub
GitHub - AzeemIdrisi/PhoneSploit-Pro: An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework…
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session. - AzeemIdrisi/PhoneSploit-Pro
🔥4
CVE-2023-29357
Microsoft SharePoint Server Elevation of Privilege Vulnerability
https://github.com/Chocapikk/CVE-2023-29357
Microsoft SharePoint Server Elevation of Privilege Vulnerability
https://github.com/Chocapikk/CVE-2023-29357
GitHub
GitHub - Chocapikk/CVE-2023-29357: Microsoft SharePoint Server Elevation of Privilege Vulnerability
Microsoft SharePoint Server Elevation of Privilege Vulnerability - Chocapikk/CVE-2023-29357
A Deep Dive into Brute Ratel C4 payloads – Part 2
https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads-part-2/
https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads-part-2/
👍1
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
graftcp can redirect the TCP connection made by the given program [application, script, shell, etc.] to SOCKS5 or HTTP proxy.
https://github.com/hmgle/graftcp
#tools
graftcp can redirect the TCP connection made by the given program [application, script, shell, etc.] to SOCKS5 or HTTP proxy.
https://github.com/hmgle/graftcp
#tools
GitHub
GitHub - hmgle/graftcp: A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy. - hmgle/graftcp
❤2
CVE-2023-29360
#Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
https://github.com/Nero22k/cve-2023-29360
#Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
https://github.com/Nero22k/cve-2023-29360
GitHub
GitHub - Nero22k/cve-2023-29360: Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver - Nero22k/cve-2023-29360
Nightmangle is post-exploitation Telegram Command and Control (C2/C&C) Agent
https://github.com/1N73LL1G3NC3x/Nightmangle
https://github.com/1N73LL1G3NC3x/Nightmangle
GitHub
GitHub - 1N73LL1G3NC3x/Nightmangle
Contribute to 1N73LL1G3NC3x/Nightmangle development by creating an account on GitHub.
🔥2
Coerced Potato New tool for local privilege escalation on a Windows machine, from a service account to NT SYSTEM. Should work on any recent versions of Windows.
https://github.com/hackvens/CoercedPotato
Research:
https://blog.hackvens.fr/articles/CoercedPotato.html
https://github.com/hackvens/CoercedPotato
Research:
https://blog.hackvens.fr/articles/CoercedPotato.html
GitHub
GitHub - hackvens/CoercedPotato
Contribute to hackvens/CoercedPotato development by creating an account on GitHub.
👎1
A repository of telemetry domains and URLs used by mobile location tracking and analytics libraries.
https://github.com/craiu/mobiletrackers
https://github.com/craiu/mobiletrackers
GitHub
GitHub - craiu/mobiletrackers: A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted…
A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads libraries. - craiu/mobiletrackers
Attacking the Android kernel using the Qualcomm TrustZone
https://tamirzb.com/attacking-android-kernel-using-qualcomm-trustzone
https://tamirzb.com/attacking-android-kernel-using-qualcomm-trustzone
Tamir Zahavi-Brunner’s Blog
Attacking the Android kernel using the Qualcomm TrustZone
In this post I describe a somewhat unique Android kernel exploit, which utilizes the TrustZone in order to compromise the kernel.
Advanced Frida Usage Part 1 – iOS Encryption Libraries
https://8ksec.io/advanced-frida-usage-part-1-ios-encryption-libraries-8ksec-blogs/
https://8ksec.io/advanced-frida-usage-part-1-ios-encryption-libraries-8ksec-blogs/
LocalPotato HTTP edition
https://decoder.cloud/2023/11/03/localpotato-http-edition/
https://github.com/decoder-it/LocalPotato
https://decoder.cloud/2023/11/03/localpotato-http-edition/
https://github.com/decoder-it/LocalPotato
Decoder's Blog
LocalPotato HTTP edition
Microsoft addressed our LocalPotato vulnerability in the SMB scenario with CVE-2023-21746 during the January 2023 Patch Tuesday. However, the HTTP scenario remains unpatched, as per Microsoft’…
Abusing microsoft access “LINKED TABLE” feature to perform NTLM forced authentication attacks
https://research.checkpoint.com/2023/abusing-microsoft-access-linked-table-feature-to-perform-ntlm-forced-authentication-attacks/
https://research.checkpoint.com/2023/abusing-microsoft-access-linked-table-feature-to-perform-ntlm-forced-authentication-attacks/
Check Point Research
Abusing Microsoft Access "Linked Table" Feature to Perform NTLM Forced Authentication Attacks - Check Point Research
What is NTLM? What common attacks exist against it? NTLM is an extremely deprecated authentication protocol introduced by Microsoft in 1993. It is a challenge-response protocol: the server keeps a secret called an “NTLM hash” derived from the user’s password…