Breaking Custom Encryption Using Frida (Mobile Application Pentesting) https://labs.cognisys.group/posts/Breaking-Custom-Ecryption-Using-Frida-Mobile-Application-pentesting/
Cognisys Group Labs
Breaking Custom Encryption Using Frida (Mobile Application Pentesting)
Overview
๐ฅ2
A Pwn2Own #SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE CVE-2024-29943
https://github.com/bjrjk/CVE-2024-29943
https://github.com/bjrjk/CVE-2024-29943
GitHub
GitHub - bjrjk/CVE-2024-29943: A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Eliminationโฆ
A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE - bjrjk/CVE-2024-29943
๐ฅ2โ1๐
1๐1
Android 12/13 Autorooter:
https://github.com/scs-labrat/android_autorooter
https://github.com/pl4int3xt/cve_2024_0044
https://github.com/scs-labrat/android_autorooter
https://github.com/pl4int3xt/cve_2024_0044
GitHub
GitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerabilityโฆ
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely - scs-labrat/android_autorooter
๐ฅ3๐1๐1๐ก1
Injecting Java in-memory payloads for post-exploitation
https://www.synacktiv.com/publications/injecting-java-in-memory-payloads-for-post-exploitation
https://www.synacktiv.com/publications/injecting-java-in-memory-payloads-for-post-exploitation
Synacktiv
Injecting Java in-memory payloads for post-exploitation
๐4
Vulnerability in Telegram for Android: Use-after-free in Connection::onReceivedData
https://bugs.chromium.org/p/project-zero/issues/detail?id=2547
https://bugs.chromium.org/p/project-zero/issues/detail?id=2547
Customizable Linux Persistence Tool for Security Research and Detection Engineering
https://github.com/Aegrah/PANIX
https://github.com/Aegrah/PANIX
๐4
Leaked Wallpaper
This is a privilege escalation tool (fixed with CVE-2024-38100 in KB5040434) that allows us to leak a user's NetNTLM hash from any session on the computer, even if we are working from a low-privileged user.
https://github.com/MzHmO/LeakedWallpaper
This is a privilege escalation tool (fixed with CVE-2024-38100 in KB5040434) that allows us to leak a user's NetNTLM hash from any session on the computer, even if we are working from a low-privileged user.
https://github.com/MzHmO/LeakedWallpaper
GitHub
GitHub - MzHmO/LeakedWallpaper: Leak of any user's NetNTLM hash. Fixed in KB5040434
Leak of any user's NetNTLM hash. Fixed in KB5040434 - MzHmO/LeakedWallpaper
๐5
CVE-2024-38077: Windows Remote Desktop Licensing Service RCE
https://github.com/CloudCrowSec001/CVE-2024-38077-POC
https://github.com/CloudCrowSec001/CVE-2024-38077-POC
CVE-2024-38856_Scanner: Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)
https://github.com/securelayer7/CVE-2024-38856_Scanner
https://github.com/securelayer7/CVE-2024-38856_Scanner
GitHub
GitHub - securelayer7/CVE-2024-38856_Scanner: Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)
Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856) - securelayer7/CVE-2024-38856_Scanner
๐ฅ3
way_Android_root.pdf
1.5 MB
#Mobile_Security
Black Hat USA 2024:
"The Way to Android Root: Exploiting Your GPU on Smartphone (CVE-2024-23380)".
Black Hat USA 2024:
"The Way to Android Root: Exploiting Your GPU on Smartphone (CVE-2024-23380)".
๐ฅ3
Begging for Bounties and More Info Stealer Logs
https://www.troyhunt.com/begging-for-bounties-and-more-info-stealer-logs/
https://www.troyhunt.com/begging-for-bounties-and-more-info-stealer-logs/
Troy Hunt
Begging for Bounties and More Info Stealer Logs
TL;DR โ Tens of millions of credentials obtained from info stealer logs populated by malware were posted to Telegram channels last month and used to shake down companies for bug bounties under the misrepresentation the data originated from their service.
๐4
Black Hat USA 2024 slides
https://github.com/onhexgroup/Conferences/tree/main/Black%20Hat%20USA%202024%20slides
https://github.com/onhexgroup/Conferences/tree/main/Black%20Hat%20USA%202024%20slides
GitHub
Conferences/Black Hat USA 2024 slides at main ยท onhexgroup/Conferences
Conference presentation slides. Contribute to onhexgroup/Conferences development by creating an account on GitHub.
๐ฅ5๐คจ1
#SCCMSecrets.py aims at exploiting #SCCM policies distribution for credentials harvesting, initial access and lateral movement.
https://github.com/synacktiv/SCCMSecrets
https://github.com/synacktiv/SCCMSecrets
GitHub
GitHub - synacktiv/SCCMSecrets: SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initialโฆ
SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement. - synacktiv/SCCMSecrets
๐ฅ3๐คจ1๐1
Exploiting Bluetooth: From your car to the bank account
Defcon slides: https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Vladyslav%20Zubkov%20Martin%20Strohmeier%20-%20Exploiting%20Bluetooth%20-%20from%20your%20car%20to%20the%20bank%20account%24%24.pdf
Defcon slides: https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Vladyslav%20Zubkov%20Martin%20Strohmeier%20-%20Exploiting%20Bluetooth%20-%20from%20your%20car%20to%20the%20bank%20account%24%24.pdf
๐4