Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
https://connormcgarr.github.io/hvci/
https://connormcgarr.github.io/hvci/
Connor McGarrโs Blog
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).
๐ฅ4
Synacktiv
Java deserialization tricks
๐ฅ2๐1
Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation. (CVE-2023-36424)
https://github.com/Nassim-Asrir/CVE-2023-36424
https://github.com/Nassim-Asrir/CVE-2023-36424
GitHub
GitHub - zerozenxlabs/CVE-2023-36424: Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation
Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation - zerozenxlabs/CVE-2023-36424
๐ฅ2
VM Escape Exploit for Parallels Desktop Hypervisor (Pwn2Own 2021) source code + video walkthrough
https://zerodayengineering.com/research/pwn2own-2021-vm-escape.html
A virtual machine escape exploit will typically require kernel privileges in the guest OS. In this exploit it off-loading the reverse-engineered toolgate protocol implementation to a Python module, while keeping low-level kernel code minimal, just enough to implement the attack interface - a nod to the principle of least privilege in systematic software engineering, which is missed a lot in non-trivial exploit development.
โ Alisa Shevchenko
https://zerodayengineering.com/research/pwn2own-2021-vm-escape.html
A virtual machine escape exploit will typically require kernel privileges in the guest OS. In this exploit it off-loading the reverse-engineered toolgate protocol implementation to a Python module, while keeping low-level kernel code minimal, just enough to implement the attack interface - a nod to the principle of least privilege in systematic software engineering, which is missed a lot in non-trivial exploit development.
โ Alisa Shevchenko
๐ฅ2
๐ฅ4๐2
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
https://blog.sekoia.io/tycoon-2fa-an-in-depth-analysis-of-the-latest-version-of-the-aitm-phishing-kit/
https://blog.sekoia.io/tycoon-2fa-an-in-depth-analysis-of-the-latest-version-of-the-aitm-phishing-kit/
Sekoia.io Blog
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
Tycoon 2FA has become one of the most widespread adversary-in-The-Middle (AiTM) phishing kits over the last few months.
๐ฅ2
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
https://github.com/notselwyn/cve-2024-1086
https://github.com/notselwyn/cve-2024-1086
GitHub
GitHub - Notselwyn/CVE-2024-1086: Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on mostโฆ
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9...
๐ฅ3๐ฉ1
A Practical Tutorial on PCIe for Total Beginners on Windows
https://ctf.re/windows/kernel/pcie/tutorial/2023/02/14/pcie-part-1/
PCIe Part 2 - All About Memory: MMIO, DMA, TLPs, and more!
https://ctf.re/kernel/pcie/tutorial/dma/mmio/tlp/2024/03/26/pcie-part-2/
https://ctf.re/windows/kernel/pcie/tutorial/2023/02/14/pcie-part-1/
PCIe Part 2 - All About Memory: MMIO, DMA, TLPs, and more!
https://ctf.re/kernel/pcie/tutorial/dma/mmio/tlp/2024/03/26/pcie-part-2/
Reversing Engineering for the Soul
A Practical Tutorial on PCIe for Total Beginners on Windows (Part 1)
Delving into the internals of PCIe by exploring practical examples and exercises
๐ฅ3
GitHub - berylliumsec/neutron: AI Powered Terminal Based Ethical Hacking Assistant
https://github.com/berylliumsec/neutron
https://github.com/berylliumsec/neutron
GitHub
GitHub - berylliumsec/neutron: AI Powered Terminal Based Ethical Hacking Assistant
AI Powered Terminal Based Ethical Hacking Assistant - berylliumsec/neutron
๐ฅ5
Pre-Pentest Checklist Part 1: Essential Questions to Answer Before Your Next Pentest
https://www.hackerone.com/penetration-testing/pre-pentest-checklist-part1
https://www.hackerone.com/penetration-testing/pre-pentest-checklist-part1
HackerOne
Pre-Pentest Checklist: Essential Questions to Answer Before Your Next Pentest | HackerOne
Explore the foundational aspects of pentestingโfocusing on 12 questions that answer the "what" and "why" of pentesting.
๐ฅ3
ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
https://github.com/YuriiCrimson/ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
https://github.com/YuriiCrimson/ExploitGSM
GitHub
GitHub - YuriiCrimson/ExploitGSM: Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5 - YuriiCrimson/ExploitGSM
๐ฅ4๐2
CVE-2024-21338: Windows Admin-to-Kernel LPE
Windows 10 & 11
PoC: https://github.com/hakaioffsec/CVE-2024-21338
Blog: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
Windows 10 & 11
PoC: https://github.com/hakaioffsec/CVE-2024-21338
Blog: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
GitHub
GitHub - hakaioffsec/CVE-2024-21338: Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11โฆ
Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. - hakaioffsec/CVE-2024-21338
๐ฅ5๐ด1๐ฟ1
LSA Whisperer is a set of tools for interacting with authentication packages using their individual message protocols. Support is currently provided for the cloudap, kerberos, msv1_0, negotiate, pku2u, and schannel packages and cloudap's AzureAD plugin.
https://github.com/EvanMcBroom/lsa-whisperer
https://github.com/EvanMcBroom/lsa-whisperer
GitHub
GitHub - EvanMcBroom/lsa-whisperer: Tools for interacting with authentication packages using their individual message protocols
Tools for interacting with authentication packages using their individual message protocols - EvanMcBroom/lsa-whisperer
๐ฅ5๐คจ1๐1