BlackHat ASIA 2024 Slides
https://github.com/onhexgroup/Conferences/tree/main/BlackHat%20ASIA%202024-Slides
https://github.com/onhexgroup/Conferences/tree/main/BlackHat%20ASIA%202024-Slides
GitHub
Conferences/BlackHat ASIA 2024-Slides at main · onhexgroup/Conferences
Conference presentation slides. Contribute to onhexgroup/Conferences development by creating an account on GitHub.
🔥6
Fuzzing Android binaries using AFL++ Frida Mode
https://valsamaras.medium.com/fuzzing-android-binaries-using-afl-frida-mode-57a49cf2ca43
https://valsamaras.medium.com/fuzzing-android-binaries-using-afl-frida-mode-57a49cf2ca43
Medium
Fuzzing Android binaries using AFL++ Frida Mode
You might find this to be a fitting prologue to my earlier post on Creating and using JVM instances in Android C/C++ applications… and you…
🔥4
Mobile Malware Analysis Part 1 – Leveraging Accessibility Features to Steal Crypto Wallet
https://8ksec.io/mobile-malware-analysis-part-1-crypto-wallet-stealer/
https://8ksec.io/mobile-malware-analysis-part-1-crypto-wallet-stealer/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Mobile Malware Analysis Part 1 – Leveraging Accessibility Features to Steal Crypto Wallet - 8kSec
Decrypting Mobile Malware! Part 1 of our blog series commences with how malicious apps use Android accessibility features to steal crypto wallet credentials.
🔥5👍1
PowerView.py
PowerView.py is an alternative for the awesome original PowerView.ps1 script. Most of the modules used in PowerView are available here ( some of the flags are changed ). Main goal is to achieve interactive session without having to repeatedly authenticate to ldap.
https://github.com/aniqfakhrul/powerview.py
PowerView.py is an alternative for the awesome original PowerView.ps1 script. Most of the modules used in PowerView are available here ( some of the flags are changed ). Main goal is to achieve interactive session without having to repeatedly authenticate to ldap.
https://github.com/aniqfakhrul/powerview.py
GitHub
GitHub - aniqfakhrul/powerview.py: Just another Powerview alternative but on steroids
Just another Powerview alternative but on steroids - aniqfakhrul/powerview.py
🔥4✍1
JS-Tap is a tool intended to help red teams attack web applications.
https://trustedsec.com/blog/js-tap-mark-ii-now-with-c2-shenanigans
https://trustedsec.com/blog/js-tap-mark-ii-now-with-c2-shenanigans
TrustedSec
JS-Tap Mark II: Now with C2 Shenanigans
🔥3👌1
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
https://github.com/hmgle/graftcp
https://github.com/hmgle/graftcp
GitHub
GitHub - hmgle/graftcp: A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy. - hmgle/graftcp
🔥3
Operation Triangulation: Attacks On IPhones/iPads - Marco Preuss
https://www.youtube.com/watch?v=xt6z4zExFII
https://www.youtube.com/watch?v=xt6z4zExFII
YouTube
Operation Triangulation: Attacks On IPhones/iPads - Marco Preuss
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
Hijacking GitHub runners to compromise the organization
https://www.synacktiv.com/publications/hijacking-github-runners-to-compromise-the-organization
https://www.synacktiv.com/publications/hijacking-github-runners-to-compromise-the-organization
Synacktiv
Hijacking GitHub runners to compromise the organization
CVE-2024-24919: Check Point arbitrary file read (as root)
https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/
watchTowr Labs
Check Point - Wrong Check Point (CVE-2024-24919)
Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This time, it is Check Point who is the focus of our penetrative gaze.
Check Point, for those unaware, is the…
Check Point, for those unaware, is the…
CCTV
Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise tracking within 50-100 meters, users can monitor others in real-time for logistics or safety, redefining how we navigate our surroundings.
https://github.com/IvanGlinkin/CCTV
Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise tracking within 50-100 meters, users can monitor others in real-time for logistics or safety, redefining how we navigate our surroundings.
https://github.com/IvanGlinkin/CCTV
GitHub
GitHub - IvanGlinkin/CCTV: Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram…
Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise tracking within 50-100 meters, users can monitor others in ...
Dynamically hooking Golang programs
https://blog.quarkslab.com/lets-go-into-the-rabbit-hole-part-1-the-challenges-of-dynamically-hooking-golang-program.html
https://metalbear.co/blog/hooking-go-from-rust-hitchhikers-guide-to-the-go-laxy/
https://blog.quarkslab.com/lets-go-into-the-rabbit-hole-part-1-the-challenges-of-dynamically-hooking-golang-program.html
https://metalbear.co/blog/hooking-go-from-rust-hitchhikers-guide-to-the-go-laxy/
Quarkslab
Let’s Go into the rabbit hole (part 1) — the challenges of dynamically hooking Golang programs - Quarkslab's blog
Golang is the most used programming language for developing cloud technologies. Tools such as Kubernetes, Docker, Containerd and gVisor are written in Go. Despite the fact that the code of these programs is open source, there is no way to analyze and extend…
Android greybox fuzzing with AFL++ Frida mode
https://blog.quarkslab.com/android-greybox-fuzzing-with-afl-frida-mode.html
https://blog.quarkslab.com/android-greybox-fuzzing-with-afl-frida-mode.html
Quarkslab
Android greybox fuzzing with AFL++ Frida mode - Quarkslab's blog
This article is about greybox fuzzing of userland targets that can be encountered in Android using AFL++ and its Frida mode. We also discuss how to target JNI functions, to test the native features invoked by Java code.
A Frida-focused GPT to help reverse engineers in writing Frida scripts and using Frida Python bindings.
https://chatgpt.com/g/g-KwZVA8dTp-fridagpt
https://chatgpt.com/g/g-KwZVA8dTp-fridagpt
ChatGPT
ChatGPT - FridaGPT
ChatGPT helps you get answers, find inspiration, and be more productive.
🔥3
CVE-2024-4577 - Yet Another PHP RCE: Make PHP-CGI Argument Injection Great Again!
https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html
https://github.com/TAM-K592/CVE-2024-4577
https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html
https://github.com/TAM-K592/CVE-2024-4577
Orange Tsai
CVE-2024-4577 - Yet Another PHP RCE: Make PHP-CGI Argument Injection Great Again!
📌 [ 繁體中文 | English ] This is a side story/extra bug while I’m preparing for my Black Hat USA presentation. I believe most of the details have already been covered in the official advisory (sh
☃2👍1🎅1🎄1
"Becoming a Vulnerability Researcher roadmap: my personal experience"
https://gist.github.com/tin-z/a469e996f8107a5ca8d3c858a2a4b65f
https://gist.github.com/tin-z/a469e996f8107a5ca8d3c858a2a4b65f
Gist
Becoming a Vulnerability Researcher roadmap: my personal experience
Becoming a Vulnerability Researcher roadmap: my personal experience - VR_roadmap.md
Progressive phishing: How PWAs can be used to steal passwords
https://www.kaspersky.com/blog/phishing-with-progressive-web-apps/51496/
https://www.kaspersky.com/blog/phishing-with-progressive-web-apps/51496/
Kaspersky
How phishing using progressive web apps (PWAs) works
We explain what progressive web apps (PWAs) are and how they can be used in phishing to steal passwords and then hijack accounts.
👍2
Breaking Custom Encryption Using Frida (Mobile Application Pentesting) https://labs.cognisys.group/posts/Breaking-Custom-Ecryption-Using-Frida-Mobile-Application-pentesting/
Cognisys Group Labs
Breaking Custom Encryption Using Frida (Mobile Application Pentesting)
Overview
🔥2
A Pwn2Own #SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE CVE-2024-29943
https://github.com/bjrjk/CVE-2024-29943
https://github.com/bjrjk/CVE-2024-29943
GitHub
GitHub - bjrjk/CVE-2024-29943: A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination…
A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE - bjrjk/CVE-2024-29943
🔥2☃1🎅1🎄1
Android 12/13 Autorooter:
https://github.com/scs-labrat/android_autorooter
https://github.com/pl4int3xt/cve_2024_0044
https://github.com/scs-labrat/android_autorooter
https://github.com/pl4int3xt/cve_2024_0044
GitHub
GitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability…
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely - scs-labrat/android_autorooter
🔥3😐1🎄1😡1