Red Team Nightmare (AV Bypass)
https://techryptic.github.io/2018/07/17/Red-Team-Nightmare-(AV-Bypass)/
https://techryptic.github.io/2018/07/17/Red-Team-Nightmare-(AV-Bypass)/
Writeup – Samsung Galaxy Apps Store RCE via MITM
https://www.adyta.pt/2019/01/29/writeup-samsung-app-store-rce-via-mitm/
https://www.adyta.pt/2019/01/29/writeup-samsung-app-store-rce-via-mitm/
Exploiting SSRF in AWS Elastic Beanstalk
https://www.notsosecure.com/exploiting-ssrf-in-aws-elastic-beanstalk/
https://www.notsosecure.com/exploiting-ssrf-in-aws-elastic-beanstalk/
NotSoSecure
Exploiting SSRF in AWS Elastic Beanstalk
In this blog, Sunil Yadav, our lead trainer for "Advanced Web Hacking " training class, will discuss a case study where a Server-Side Request Forgery (SSRF) vulnerability was identified and exploited
ActiveX Exploitation in 2019 :: Instantiation is not Scripting
https://srcincite.io/blog/2019/02/01/activex-exploitation-in-2018-instantiation-is-not-scripting.html
https://srcincite.io/blog/2019/02/01/activex-exploitation-in-2018-instantiation-is-not-scripting.html
Extracting hard-coded credentials using managed code debugging techniques in Windbg (2012)
http://www.exploit-monday.com/2012/05/extracting-hard-coded-credentials-using.html
http://www.exploit-monday.com/2012/05/extracting-hard-coded-credentials-using.html
Exploit-Monday
Extracting hard-coded credentials using managed code debugging techniques in Windbg
tl;dr version Using some simple managed code debugging techniques, you can easily pull out hard-coded credentials from a binary claiming t...
Windows Exploitation Tricks: Exploiting Arbitrary Object Directory Creation for Local Elevation of Privilege
https://googleprojectzero.blogspot.com/2018/08/windows-exploitation-tricks-exploiting.html
https://googleprojectzero.blogspot.com/2018/08/windows-exploitation-tricks-exploiting.html
Blogspot
Windows Exploitation Tricks: Exploiting Arbitrary Object Directory Creation for Local Elevation of Privilege
Posted by James Forshaw, Project Zero And we’re back again for another blog in my series on Windows Exploitation tricks. This time I’ll...
https://github.com/schutzwerk/CANalyzat0r
CANalyzat0r: A security analysis toolkit for proprietary car protocols
CANalyzat0r: A security analysis toolkit for proprietary car protocols