Pentester
@news4hack
2.92K
subscribers
119
photos
3
videos
163
files
2.77K
links
- Offensive Security (Red Teaming / PenTesting)
- BlueTeam (OperationSec, TreatHunting, DFIR)
- Reverse Engineering / Malware Analisys
- Web Security
Download Telegram
Join
Pentester
2.92K subscribers
Pentester
https://posts.specterops.io/reviving-dde-using-onenote-and-excel-for-code-execution-d7226864caee
Medium
Reviving DDE: Using OneNote and Excel for Code Execution
TL;DR: You can achieve DDE execution with Excel SpreadSheets embedded within OneNote. This bypasses the original Excel mitigation ruleset…
Pentester
https://halcyon-ide.org/
halcyon-ide.org
Halcyon IDE :: An IDE for Nmap Script Developers
Halcyon IDE, An IDE for Nmap Script Development, Nmap Script Engine, NSE, Integrated Development Environment, Nmap, Network Mapping, Network Security, Port scanning, Script Development, IDE
Pentester
https://medium.com/0xcc/electrons-bug-shellexecute-to-blame-cacb433d0d62
Pentester
https://injectify.js.org/
injectify.js.org
Injectify Documentation
Perform advanced MiTM attacks on websites with ease.
Pentester
https://embedi.com/blog/grim-iot-reaper-1-and-0-day-vulnerabilities-at-the-service-of-botnets/
Embedi
Grim IoT Reaper: 1- and 0-day vulnerabilities at the service of botnets
On the 19th of October, 2017, the world of IoT shuddered, facing a new enemy – a huge botnet that would be later called Reaper. Reaper is grim and is by far grimmer than the notorious Mirai botnet. According to the data provided by 360 Netlab, it has already…
Pentester
http://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/
Absolomb
Windows Privilege Escalation Guide
Privilege escalation always comes down to proper enumeration. But to accomplish proper enumeration you need to know what to check and look for. This takes familiarity with systems that normally comes along with experience. At first privilege escalation can…
Pentester
Посмотрите, о чем твитнул(а)
@NahamSec
:
https://twitter.com/NahamSec/status/958042761357217792?s=09
Twitter
Ben Sadeghipour
¯\_(ツ)_/¯
Pentester
https://astr0baby.wordpress.com/2018/01/30/running-latest-x64-mimikatz-on-windows-10/amp/?__twitter_impression=true
Astr0baby's not so random thoughts _____ rand() % 100;
Running latest x64 Mimikatz on Windows 10
I have been keeping this journal for 7 years now and I guess this is a reason to add some interesting stuff (lately I have been busy in the compiler world on various architectures and different de…
Pentester
https://securityonline.info/top-7-nmap-nse-scripts-for-reconnmap-scannmap-tutorialnmap-download/?utm_source=ReviveOldPost&utm_medium=social&utm_campaign=ReviveOldPost
Penetration Testing
Top 7 Nmap NSE Scripts Recon,nmap nse,nmap tutorial,nmap scan
Top 7 Nmap NSE Scripts Recon,nmap nse,nmap tutorial,nmap scan,nmap download,advance nmap tutorial,nmap script nse,zmap nmap tutorial
Pentester
https://github.com/k0keoyo/kDriver-Fuzzer
GitHub
GitHub - k0keoyo/kDriver-Fuzzer
Contribute to k0keoyo/kDriver-Fuzzer development by creating an account on GitHub.
Pentester
https://github.com/L3cr0f/DccwBypassUAC
GitHub
GitHub - L3cr0f/DccwBypassUAC: Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".
Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe". - L3cr0f/DccwBypassUAC
Pentester
https://github.com/samdenty99/injectify
GitHub
GitHub - samdenty/injectify: Perform advanced MiTM attacks on websites with ease
💉
Perform advanced MiTM attacks on websites with ease
💉
- samdenty/injectify
Pentester
https://github.com/dxa4481/cssInjection
GitHub
GitHub - dxa4481/cssInjection: Stealing CSRF tokens with CSS injection (without iFrames)
Stealing CSRF tokens with CSS injection (without iFrames) - dxa4481/cssInjection
Pentester
https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/
ropnop blog
Upgrading Simple Shells to Fully Interactive TTYs
Catching a reverse shell over netcat is great…until you accidentally Ctrl-C and lose it. These techniques let you upgrade your shell to a proper TTY
Pentester
https://n0where.net/mitm-rdp-connections-seth
CyberPunk
MITM RDP Connections: Seth
Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials.
Pentester
https://decoder.cloud/2018/02/02/getting-system/amp/?__twitter_impression=true
Decoder's Blog
Getting SYSTEM
In your red teaming or pentesting activities escalating to SYSTEM on a Windows box is always the desired objective. The SYSTEM user is a special operating system user with the highest privilege, m…
Pentester
https://cxsecurity.com/issue/WLB-2018020095
Cxsecurity
Windows MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution - CXSecurity.com
sleepya has realised a new security note Windows MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
Pentester
https://blog.ripstech.com/2018/joomla-privilege-escalation-via-sql-injection/
Pentester
https://www.attackdebris.com/?p=311
Attack Debris
Kerberos Domain Username Enumeration
Kerberos Domain Username Enumeration Over recent years enumerating valid operating system level user names from up-to-date and well-maintained Windows environments, even from an internal test persp…
Pentester
https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/
EK
Pentest Tips and Tricks
Pentest Handy Tips and Tricks.
Pentester
https://payatu.com/reversing-exploiting-ble-4-0-communication/
Payatu
Reversing and Exploiting BLE 4.0 communication
This post is about exploiting BLE 4.0 communication. Learn how to conduct reverse engineering of BLE 4.0 communications and exploit it.