A Practical Tutorial on PCIe for Total Beginners on Windows
https://ctf.re/windows/kernel/pcie/tutorial/2023/02/14/pcie-part-1/
PCIe Part 2 - All About Memory: MMIO, DMA, TLPs, and more!
https://ctf.re/kernel/pcie/tutorial/dma/mmio/tlp/2024/03/26/pcie-part-2/
https://ctf.re/windows/kernel/pcie/tutorial/2023/02/14/pcie-part-1/
PCIe Part 2 - All About Memory: MMIO, DMA, TLPs, and more!
https://ctf.re/kernel/pcie/tutorial/dma/mmio/tlp/2024/03/26/pcie-part-2/
Reversing Engineering for the Soul
A Practical Tutorial on PCIe for Total Beginners on Windows (Part 1)
Delving into the internals of PCIe by exploring practical examples and exercises
๐ฅ3
GitHub - berylliumsec/neutron: AI Powered Terminal Based Ethical Hacking Assistant
https://github.com/berylliumsec/neutron
https://github.com/berylliumsec/neutron
GitHub
GitHub - berylliumsec/neutron: AI Powered Terminal Based Ethical Hacking Assistant
AI Powered Terminal Based Ethical Hacking Assistant - berylliumsec/neutron
๐ฅ5
Pre-Pentest Checklist Part 1: Essential Questions to Answer Before Your Next Pentest
https://www.hackerone.com/penetration-testing/pre-pentest-checklist-part1
https://www.hackerone.com/penetration-testing/pre-pentest-checklist-part1
HackerOne
Pre-Pentest Checklist: Essential Questions to Answer Before Your Next Pentest | HackerOne
Explore the foundational aspects of pentestingโfocusing on 12 questions that answer the "what" and "why" of pentesting.
๐ฅ3
ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
https://github.com/YuriiCrimson/ExploitGSM
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
https://github.com/YuriiCrimson/ExploitGSM
GitHub
GitHub - YuriiCrimson/ExploitGSM: Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5 - YuriiCrimson/ExploitGSM
๐ฅ4๐2
CVE-2024-21338: Windows Admin-to-Kernel LPE
Windows 10 & 11
PoC: https://github.com/hakaioffsec/CVE-2024-21338
Blog: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
Windows 10 & 11
PoC: https://github.com/hakaioffsec/CVE-2024-21338
Blog: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
GitHub
GitHub - hakaioffsec/CVE-2024-21338: Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11โฆ
Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. - hakaioffsec/CVE-2024-21338
๐ฅ5๐ด1๐ฟ1
LSA Whisperer is a set of tools for interacting with authentication packages using their individual message protocols. Support is currently provided for the cloudap, kerberos, msv1_0, negotiate, pku2u, and schannel packages and cloudap's AzureAD plugin.
https://github.com/EvanMcBroom/lsa-whisperer
https://github.com/EvanMcBroom/lsa-whisperer
GitHub
GitHub - EvanMcBroom/lsa-whisperer: Tools for interacting with authentication packages using their individual message protocols
Tools for interacting with authentication packages using their individual message protocols - EvanMcBroom/lsa-whisperer
๐ฅ5๐คจ1๐1
CLI tool (python) for managing Cortex XDR
* changing rules
* restarting the XDR process
* disabling the local analysis engine
* inserting any python code to run
https://github.com/SafeBreach-Labs/CortexVortex
* changing rules
* restarting the XDR process
* disabling the local analysis engine
* inserting any python code to run
https://github.com/SafeBreach-Labs/CortexVortex
GitHub
GitHub - SafeBreach-Labs/CortexVortex
Contribute to SafeBreach-Labs/CortexVortex development by creating an account on GitHub.
๐3๐ฅ2โค1๐1
DarkGPT is an OSINT assistant based on GPT-4-200K designed to perform queries on leaked databases, thus providing an artificial intelligence assistant that can be useful in your traditional OSINT processes.
https://github.com/luijait/DarkGPT
https://github.com/luijait/DarkGPT
๐4๐ฅ4
SilverPotato
https://decoder.cloud/2024/04/24/hello-im-your-domain-admin-and-i-want-to-authenticate-against-you/
https://decoder.cloud/2024/04/24/hello-im-your-domain-admin-and-i-want-to-authenticate-against-you/
Decoder's Blog
Hello: Iโm your Domain Admin and I want to authenticate against you
TL;DR (really?): Members of Distributed COM Users or Performance Log Users Groups can trigger from remote and relay the authentication of users connected on the target server, including Domain Contโฆ
๐3โก2๐
1
BlackHat ASIA 2024 Slides
https://github.com/onhexgroup/Conferences/tree/main/BlackHat%20ASIA%202024-Slides
https://github.com/onhexgroup/Conferences/tree/main/BlackHat%20ASIA%202024-Slides
GitHub
Conferences/BlackHat ASIA 2024-Slides at main ยท onhexgroup/Conferences
Conference presentation slides. Contribute to onhexgroup/Conferences development by creating an account on GitHub.
๐ฅ6
Fuzzing Android binaries using AFL++ Frida Mode
https://valsamaras.medium.com/fuzzing-android-binaries-using-afl-frida-mode-57a49cf2ca43
https://valsamaras.medium.com/fuzzing-android-binaries-using-afl-frida-mode-57a49cf2ca43
Medium
Fuzzing Android binaries using AFL++ Frida Mode
You might find this to be a fitting prologue to my earlier post on Creating and using JVM instances in Android C/C++ applicationsโฆ and youโฆ
๐ฅ4
Mobile Malware Analysis Part 1 โ Leveraging Accessibility Features to Steal Crypto Wallet
https://8ksec.io/mobile-malware-analysis-part-1-crypto-wallet-stealer/
https://8ksec.io/mobile-malware-analysis-part-1-crypto-wallet-stealer/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Mobile Malware Analysis Part 1 โ Leveraging Accessibility Features to Steal Crypto Wallet - 8kSec
Decrypting Mobile Malware! Part 1 of our blog series commences with how malicious apps use Android accessibility features to steal crypto wallet credentials.
๐ฅ5๐1
PowerView.py
PowerView.py is an alternative for the awesome original PowerView.ps1 script. Most of the modules used in PowerView are available here ( some of the flags are changed ). Main goal is to achieve interactive session without having to repeatedly authenticate to ldap.
https://github.com/aniqfakhrul/powerview.py
PowerView.py is an alternative for the awesome original PowerView.ps1 script. Most of the modules used in PowerView are available here ( some of the flags are changed ). Main goal is to achieve interactive session without having to repeatedly authenticate to ldap.
https://github.com/aniqfakhrul/powerview.py
GitHub
GitHub - aniqfakhrul/powerview.py: Just another Powerview alternative but on steroids
Just another Powerview alternative but on steroids - aniqfakhrul/powerview.py
๐ฅ4โ1
JS-Tap is a tool intended to help red teams attack web applications.
https://trustedsec.com/blog/js-tap-mark-ii-now-with-c2-shenanigans
https://trustedsec.com/blog/js-tap-mark-ii-now-with-c2-shenanigans
TrustedSec
JS-Tap Mark II: Now with C2 Shenanigans
๐ฅ3๐1