PE Sec Info – A Simple Tool to Manipulate ASLR and DEP Flags
https://osandamalith.com/2018/10/24/pe-sec-info-a-simple-tool-to-manipulate-aslr-and-dep-flags/
https://osandamalith.com/2018/10/24/pe-sec-info-a-simple-tool-to-manipulate-aslr-and-dep-flags/
🔐Blog of Osanda
PE Sec Info – A Simple Tool to Manipulate ASLR and DEP Flags | 🔐Blog of Osanda
Recently I was interested in exploring the PE headers and writing simple programs to manipulate different headers. There are thousands of applications and code to be found on this topic. I started …
This media is not supported in your browser
VIEW IN TELEGRAM
To see the future clearly, you have to look to the past. #MrRobot
Capturing NetNTLM Hashes with Office [DOT] XML Documents
https://bohops.com/2018/08/04/capturing-netntlm-hashes-with-office-dot-xml-documents/
https://bohops.com/2018/08/04/capturing-netntlm-hashes-with-office-dot-xml-documents/
bohops
Capturing NetNTLM Hashes with Office [DOT] XML Documents
TL;DR An Office XML (.xml) document can call a remote XSL stylesheet over SMB. If this occurs against an attacker controlled server, the net-NTLM authentication hash (challenge/response) of t…
Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques
https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
Elastic Blog
Ten process injection techniques: A technical survey of common and trending process injection techniques
Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process...
Code injection on Windows using Python: a simple example
https://www.andreafortuna.org/programming/code-injection-on-windows-using-python-a-simple-example/
https://www.andreafortuna.org/programming/code-injection-on-windows-using-python-a-simple-example/
So Long, and Thanks for All the Fish
Code injection on Windows using Python: a simple example
Recently i had to perform some comparative tests on a couple of whitelisting solutions. One of the crucial step of the test was the proper functioning of memory monitoring feature, useful in case o…
Injecting Shellcode into a Remote Process with Python
https://www.christophertruncer.com/injecting-shellcode-into-a-remote-process-with-python/
https://www.christophertruncer.com/injecting-shellcode-into-a-remote-process-with-python/
Christopher Truncer's Website
Injecting Shellcode into a Remote Process with Python
In order to inject shellcode into a remote process, we’re going to have to interact with the Windows API, and it’s actually going to be fairly simple to do. To start off, you need to check that yo…
Manual Mapping DLL Injection Tutorial
https://www.youtube.com/watch?v=qzZTXcBu3cE
https://www.youtube.com/watch?v=EXRm7tCOwGg
https://www.youtube.com/watch?v=c8B--5lKbNg
https://www.youtube.com/watch?v=_7SvkCGE67M
https://www.youtube.com/watch?v=qzZTXcBu3cE
https://www.youtube.com/watch?v=EXRm7tCOwGg
https://www.youtube.com/watch?v=c8B--5lKbNg
https://www.youtube.com/watch?v=_7SvkCGE67M
YouTube
Manual Mapping DLL Injection Tutorial - How to Manual Map 1of4
🔥 Learn How To Manually Map a DLL Like a Pro & Bypass Anticheats
👨💻 Buy Our Courses: https://guidedhacking.com/register/
💰 Donate on Patreon: https://patreon.com/guidedhacking
❤️ Follow us on Social Media: https://linktr.ee/guidedhacking
🔗 Article Link:…
👨💻 Buy Our Courses: https://guidedhacking.com/register/
💰 Donate on Patreon: https://patreon.com/guidedhacking
❤️ Follow us on Social Media: https://linktr.ee/guidedhacking
🔗 Article Link:…
Privilege Escalation & Post-Exploitation
https://rmusser.net/docs/Privilege%20Escalation%20&%20Post-Exploitation.html
https://rmusser.net/docs/Privilege%20Escalation%20&%20Post-Exploitation.html
SleuthQL Description
SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque variables were identified.
https://github.com/RhinoSecurityLabs/SleuthQL
https://youtu.be/Sp3FevOAmCs
SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque variables were identified.
https://github.com/RhinoSecurityLabs/SleuthQL
https://youtu.be/Sp3FevOAmCs
GitHub
GitHub - RhinoSecurityLabs/SleuthQL: Python3 Burp History parsing tool to discover potential SQL injection points. To be used in…
Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap. - RhinoSecurityLabs/SleuthQL
RID HIJACKING: Maintaining Access on Windows Machines #DerbyCon
https://github.com/r4wd3r/RID-Hijacking/blob/master/slides/derbycon-8.0/RID_HIJACKING_DERBYCON_2018.pdf
https://github.com/r4wd3r/RID-Hijacking/blob/master/slides/derbycon-8.0/RID_HIJACKING_DERBYCON_2018.pdf
GitHub
r4wd3r/RID-Hijacking
Windows RID Hijacking persistence technique. Contribute to r4wd3r/RID-Hijacking development by creating an account on GitHub.