[Research] Java Serialization Objects (JSO): An Exploitation Guide | Rapid7
https://www.rapid7.com/research/report/exploiting-jsos/
https://www.rapid7.com/research/report/exploiting-jsos/
Rapid7
Rapid7 Labs - Trusted Cybersecurity Research
Port Forwarding in Windows | Windows OS Hub
http://woshub.com/port-forwarding-in-windows/
http://woshub.com/port-forwarding-in-windows/
Windows OS Hub
Configuring Port Forwarding in Windows | Windows OS Hub
You can configure network port forwarding in all Windows versions without using third-party tools. Using a port forwarding rule, you can redirect an incoming TCP connection (IPv4 or IPv6) from…
GitHub - Critical-Start/pastebin_scraper
https://github.com/Critical-Start/pastebin_scraper
https://github.com/Critical-Start/pastebin_scraper
sirdarckcat: [🌐💧💥] HTTP Cache Cross-Site Leaks
http://sirdarckcat.blogspot.com/2019/03/http-cache-cross-site-leaks.html?m=1
http://sirdarckcat.blogspot.com/2019/03/http-cache-cross-site-leaks.html?m=1
Blogspot
[🌐💧💥] HTTP Cache Cross-Site Leaks
In this blog post I want to talk about a cool type of attacks ( XSLeaks ) that are cooler than what most developers and security researchers...
Fuzzilli, JavaScript engine fuzzer, is now open source: https://t.co/2noeJIATVf
GitHub
googleprojectzero/fuzzilli
A JavaScript Engine Fuzzer. Contribute to googleprojectzero/fuzzilli development by creating an account on GitHub.
Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
Medium
Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest
PostgreSQL from 9.3 to latest has functionality allowing the database superuser & users in the ‘pg_read_server_files’ to execute OS…
A macOS, post-exploit, red teaming framework built with python3 and JavaScript. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout mac and linux based red teaming. https://github.com/its-a-feature/Apfell
GitHub
GitHub - its-a-feature/Mythic: A collaborative, multi-platform, red teaming framework
A collaborative, multi-platform, red teaming framework - its-a-feature/Mythic
GitHub - marco-lancini/goscan: Interactive Network Scanner
https://github.com/marco-lancini/goscan
https://github.com/marco-lancini/goscan
GitHub
GitHub - marco-lancini/goscan: Interactive Network Scanner
Interactive Network Scanner. Contribute to marco-lancini/goscan development by creating an account on GitHub.
GitHub - paranoidninja/CarbonCopy: A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
https://github.com/paranoidninja/CarbonCopy
https://github.com/paranoidninja/CarbonCopy
GitHub
GitHub - paranoidninja/CarbonCopy: A tool which creates a spoofed certificate of any online website and signs an Executable for…
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux - paranoidninja/CarbonCopy
GitHub - trustedsec/social-engineer-toolkit: The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
https://github.com/TrustedSec/social-engineer-toolkit
https://github.com/TrustedSec/social-engineer-toolkit
GitHub
GitHub - trustedsec/social-engineer-toolkit: The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of…
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here. - trustedsec/social-engineer-toolkit
Data Exfiltration | Azeria Labs
https://azeria-labs.com/data-exfiltration/
https://azeria-labs.com/data-exfiltration/
Azeria-Labs
Data Exfiltration
Zero Day Initiative — CVE-2019-0604: Details of a Microsoft SharePoint RCE Vulnerability
https://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability
https://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability
Zero Day Initiative
Zero Day Initiative — CVE-2019-0604: Details of a Microsoft SharePoint RCE Vulnerability
Last month, Microsoft released patches to address two remote code execution (RCE) vulnerabilities in SharePoint. In both Critical-rated cases, an attacker could send a specially crafted request to execute their code in the context of the SharePoint application…
Windows Privilege Escalation Guide
http://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
http://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
Absolomb
Windows Privilege Escalation Guide
Privilege escalation always comes down to proper enumeration. But to accomplish proper enumeration you need to know what to check and look for. This takes familiarity with systems that normally comes along with experience. At first privilege escalation can…
UPDATE: AutoSploit 3.0 - The New Year's edition - PenTestIT
http://pentestit.com/update-autosploit-3-0-the-new-years-edition/amp/?__twitter_impression=true
http://pentestit.com/update-autosploit-3-0-the-new-years-edition/amp/?__twitter_impression=true
PenTestIT
UPDATE: AutoSploit 3.0 - The New Year's edition - PenTestIT
I wrote about AutoSploit in a post titled AutoSploit = Shodan/Censys/Zoomeye + Metasploit and it’s subsequent update to AutoSploit 2.2. Recently, AutoSploit 3.0 was released. This post tries to describe the changes between the last release and the newest…
GitHub - SecureThisShit/WinPwn: Automation for internal Windows Penetrationtest / AD-Security - Still much work to do
https://github.com/SecureThisShit/WinPwn
https://github.com/SecureThisShit/WinPwn
GitHub
GitHub - S3cur3Th1sSh1t/WinPwn: Automation for internal Windows Penetrationtest / AD-Security
Automation for internal Windows Penetrationtest / AD-Security - S3cur3Th1sSh1t/WinPwn
Writing a Custom Shellcode Encoder – syscall59 – Medium
https://medium.com/syscall59/writing-a-custom-shellcode-encoder-31816e767611
https://medium.com/syscall59/writing-a-custom-shellcode-encoder-31816e767611
Medium
Writing a Custom Shellcode Encoder
An example of how to write a custom encoder and decoder in plain assembly.