RemoteRecon
RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent.
https://github.com/xorrior/Remo
RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent.
https://github.com/xorrior/Remo
EDM proxy for infecting files on-the-fly
Offensive Proxy server
POC for infecting PE files, ZIP files, Office documents on the fly during a HTTP MitM.
https://github.com/LeonardoNve/edm
#wtf
#mitm
#windows
@sec_nerd_en
Offensive Proxy server
POC for infecting PE files, ZIP files, Office documents on the fly during a HTTP MitM.
https://github.com/LeonardoNve/edm
#wtf
#mitm
#windows
@sec_nerd_en
GitHub
LeonardoNve/edm
Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2 - LeonardoNve/edm
https://www.nytimes.com/2018/09/09/world/europe/sergei-skripal-russian-spy-poisoning.html
#Skripal_case
#Spy_stories
#Skripal_case
#Spy_stories
NY Times
A Spy Story: Sergei Skripal Was a Little Fish. He Had a Big Enemy. (Published 2018)
Sergei Skripal and Vladimir Putin, Soviet men of the same age, were raised to wage war against the West. After the Soviet Union collapsed, one rose. And one fell.
Penetration Testing/Security Cheatsheets a huge list.
https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt
#pentest
@sec_nerd_en
https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt
#pentest
@sec_nerd_en
Use PowerShell to Find the History of USB Flash Drive Usage
https://blogs.technet.microsoft.com/heyscriptingguy/2012/05/18/use-powershell-to-find-the-history-of-usb-flash-drive-usage/
#windows
#ps
#enum
@sec_nerd_en
https://blogs.technet.microsoft.com/heyscriptingguy/2012/05/18/use-powershell-to-find-the-history-of-usb-flash-drive-usage/
#windows
#ps
#enum
@sec_nerd_en
Droidefense Engine
Advance Android Malware Analysis Framework
https://github.com/droidefense/engine
#android
#malware
@sec_nerd_en
Advance Android Malware Analysis Framework
https://github.com/droidefense/engine
#android
#malware
@sec_nerd_en
How does a #Bitcoin Transaction work? {Infographic}
#blockchain #fintech #BTC #CyberSecurity #DLT #innovation #cryptocurrency #infosec #disruption #Security #Crypto
@sec_nerd_en
#blockchain #fintech #BTC #CyberSecurity #DLT #innovation #cryptocurrency #infosec #disruption #Security #Crypto
@sec_nerd_en
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html
#Windows_API_Hooking
#Malware
#PoC
#Windows_API_Hooking
#Malware
#PoC
Malwaretech
Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)
We’ll be writing a hooking engine using trampoline based hooks as explained in the previous article (we don’t handle relative instructions as they’re very rare, but we do use atomic write operations to prevent race conditions).
First things first, we need…
First things first, we need…
IoT Pentesting 101 && IoT security 101
https://github.com/V33RU/IoTSecurity101
#iot
#pentest
#security
@sec_nerd_en
https://github.com/V33RU/IoTSecurity101
#iot
#pentest
#security
@sec_nerd_en
GitHub
GitHub - V33RU/awesome-connected-things-sec: A Curated list of Security Resources for all connected things
A Curated list of Security Resources for all connected things - V33RU/awesome-connected-things-sec