Windows Kernel Exploitation Tutorial
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
https://rootkits.xyz/blog/2017/08/kernel-stack-overflow/
https://rootkits.xyz/blog/2017/09/kernel-write-what-where/
https://rootkits.xyz/blog/2017/11/kernel-pool-overflow/
https://rootkits.xyz/blog/2018/01/kernel-null-pointer-dereference/
https://rootkits.xyz/blog/2018/01/kernel-uninitialized-stack-variable/
https://rootkits.xyz/blog/2018/03/kernel-uninitialized-heap-variable/
https://rootkits.xyz/blog/2018/04/kernel-use-after-free/
@sec_nerd_en
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
https://rootkits.xyz/blog/2017/08/kernel-stack-overflow/
https://rootkits.xyz/blog/2017/09/kernel-write-what-where/
https://rootkits.xyz/blog/2017/11/kernel-pool-overflow/
https://rootkits.xyz/blog/2018/01/kernel-null-pointer-dereference/
https://rootkits.xyz/blog/2018/01/kernel-uninitialized-stack-variable/
https://rootkits.xyz/blog/2018/03/kernel-uninitialized-heap-variable/
https://rootkits.xyz/blog/2018/04/kernel-use-after-free/
@sec_nerd_en
rootkit
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit
Intro Recently, I had the pleasure to attend the training on Windows Kernel Exploitation at nullcon by the HackSysTeam. The training was well executed, and I got the intro into the world of kernel. But, as you know, nobody could teach you internals about…
netstat -lepunt # Show the TCP and UDP ports being listened on and if you're root, also show the process associated, user, etc.
Server-Side Spreadsheet Injection – Formula Injection to Remote Code Execution
https://www.bishopfox.com/blog/2018/06/server-side-spreadsheet-injections/
https://www.bishopfox.com/blog/2018/06/server-side-spreadsheet-injections/
Bypass all anti-viruses by Encrypted Payloads with C#
https://www.peerlyst.com/posts/bypass-all-anti-viruses-by-encrypted-payloads-with-c-damon-mohammadbagher-1
https://www.peerlyst.com/posts/bypass-all-anti-viruses-by-encrypted-payloads-with-c-damon-mohammadbagher-1
Peerlyst
Bypass all anti-viruses by Encrypted Payloads with C#
Some people asked me about how you can bypass all AV anti-viruses?My answer is: very simple. But this is Secretly Technique and the most pentester or hackers never share that for other people. They have their reason for that like me and I can tell yo
Merry Christmas. I hope nobody buys you a spy device this year. (they probably did)
echo -e 'MERRY\n CHRISTMAS!' | toilet -w130 | boxes -d santa | grep --color .
CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability
https://github.com/WyAtu/CVE-2018-8581/
https://github.com/WyAtu/CVE-2018-8581/
GitHub
GitHub - WyAtu/CVE-2018-8581: CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability
CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability - WyAtu/CVE-2018-8581
Remote_elf.py (Remote binary execution) source code ⬇️
https://github.com/JusticeRage/FFM/commit/b9a5c787ec7fa99cf8eb2d72c90fed35f592a323
PDF ⬇️
https://2018.zeronights.ru/wp-content/uploads/materials/09-ELF-execution-in-Linux-RAM.pdf
https://github.com/JusticeRage/FFM/commit/b9a5c787ec7fa99cf8eb2d72c90fed35f592a323
PDF ⬇️
https://2018.zeronights.ru/wp-content/uploads/materials/09-ELF-execution-in-Linux-RAM.pdf
GitHub
A new command, !elf, can run local binaries on the remote machine in … · JusticeRage/FFM@b9a5c78
…memory.
Cleaned up the output of the remote python script command.
Cleaned up the output of the remote python script command.