Malicious DLL execution using Apple's APSDaemon.exe signed binary - Malware - 0x00sec - The Home of the Hacker
https://0x00sec.org/t/malicious-dll-execution-using-apples-apsdaemon-exe-signed-binary/13409
https://0x00sec.org/t/malicious-dll-execution-using-apples-apsdaemon-exe-signed-binary/13409
GitHub - 0vercl0k/CVE-2019-9810: Exploit for CVE-2019-9810 Firefox on Windows 64 bits.
https://github.com/0vercl0k/CVE-2019-9810
https://github.com/0vercl0k/CVE-2019-9810
GitHub
GitHub - 0vercl0k/CVE-2019-9810: Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
Exploit for CVE-2019-9810 Firefox on Windows 64-bit. - 0vercl0k/CVE-2019-9810
Docker Tutorial Series – Romin Irani’s Blog
https://rominirani.com/docker-tutorial-series-a7e6ff90a023
https://rominirani.com/docker-tutorial-series-a7e6ff90a023
Medium
Docker Tutorial Series
Unless you have intentionally decided to block any news around software in your social feeds, it is likely that you have heard about Docker. I have written a few posts around Docker and how you can…
Exploring Mimikatz - Part 1 - WDigest
https://blog.xpnsec.com/exploring-mimikatz-part-1/amp/?__twitter_impression=true
https://blog.xpnsec.com/exploring-mimikatz-part-1/amp/?__twitter_impression=true
XPN InfoSec Blog
Exploring Mimikatz - Part 1 - WDigest
We’ve packed it, we’ve wrapped it, we’ve injected it and powershell’d it, and now we've settled on feeding it a memory dump, and still Mimikatz remains the tool of choice when extracting credentials from lsass on Windows systems. Of course this is due to…
GitHub - Mr-Un1k0d3r/Shellcoding: Shellcoding utilities
https://github.com/Mr-Un1k0d3r/Shellcoding
https://github.com/Mr-Un1k0d3r/Shellcoding
GitHub
GitHub - Mr-Un1k0d3r/Shellcoding: Shellcoding utilities
Shellcoding utilities. Contribute to Mr-Un1k0d3r/Shellcoding development by creating an account on GitHub.
An intro to pentesting an Android phone – Noteworthy - The Journal Blog
https://blog.usejournal.com/an-intro-to-pentesting-an-android-phone-464ec4860f39
https://blog.usejournal.com/an-intro-to-pentesting-an-android-phone-464ec4860f39
Medium
Pentesting Android applications by reversing and finding attack surfaces
In this past semester, I was taking a cybersecurity class. Since our awesome professor believe in the concept that we learn by doing and…
» Attack Methods for Gaining Domain Admin Rights in Active Directory » Active Directory Security
https://adsecurity.org/?p=2362
https://adsecurity.org/?p=2362
Active Directory & Azure AD/Entra ID Security
Attack Methods for Gaining Domain Admin Rights in Active Directory
There are many ways an attacker can gain Domain Admin rights in Active Directory. This post is meant to describe some of the more popular ones in current use. The techniques described here "assume breach" where an attacker already has a foothold on an internal…
RCE in EA's Origin Desktop Client – Underdog Security – Our blog...
https://blog.underdogsecurity.com/rce_in_origin_client/
https://blog.underdogsecurity.com/rce_in_origin_client/
Reverse-engineering Broadcom wireless chipsets
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
Quarkslab
Reverse-engineering Broadcom wireless chipsets - Quarkslab's blog
Broadcom is one of the major vendors of wireless devices worldwide. Since these chips are so widespread they constitute a high value target to attackers and any vulnerability found in them should be considered to pose high risk. In this blog post I provide…
Exploiting Remote File Inclusion (RFI) in PHP application and bypassing remote URL inclusion restriction | Start With Linux | Mannu Linux
http://www.mannulinux.org/2019/05/exploiting-rfi-in-php-bypass-remote-url-inclusion-restriction.html?m=1
http://www.mannulinux.org/2019/05/exploiting-rfi-in-php-bypass-remote-url-inclusion-restriction.html?m=1
www.mannulinux.org
Exploiting Remote File Inclusion (RFI) in PHP application and bypassing remote URL inclusion restriction
Learn Basic Concepts of Linux. Best site to learn Linux from beginner to Advanced.
Seven years after v1.0, Microsoft has released a new version of Attack Surface Analyzer, a tool that logs the changes made to a Windows OS during the installation of third-party applications.
https://t.co/7vRZ3B3g2G
https://t.co/7vRZ3B3g2G
ZDNet
Microsoft releases new version of Attack Surface Analyzer utility
New Attack Surface Analyzer 2.0 works on Windows, but also Mac and Linux.
PayloadsAllTheThings/Reverse Shell Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThings · GitHub
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
GitHub
PayloadsAllTheThings/Methodology and Resources/Reverse Shell Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - swisskyrepo/PayloadsAllTheThings
GitHub - zerosum0x0/CVE-2019-0708: Scanner PoC for CVE-2019-0708 RDP RCE vuln
https://github.com/zerosum0x0/CVE-2019-0708
https://github.com/zerosum0x0/CVE-2019-0708