https://github.com/projectzeroindia/CVE-2019-11510
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
GitHub
GitHub - projectzeroindia/CVE-2019-11510: Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510) - projectzeroindia/CVE-2019-11510
Windows oneliners to download remote payload and execute arbitrary code
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/amp/
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/amp/
arno0x0x
Windows oneliners to download remote payload and execute arbitrary code
In the wake of the recent buzz and trend in using DDE for executing arbitrary command lines and eventually compromising a system, I asked myself « what are the coolest command lines an a…
CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow
https://www.zerodayinitiative.com/blog/2019/8/22/cve-2019-12527-code-execution-on-squid-proxy-through-a-heap-buffer-overflow
https://www.zerodayinitiative.com/blog/2019/8/22/cve-2019-12527-code-execution-on-squid-proxy-through-a-heap-buffer-overflow
Zero Day Initiative
Zero Day Initiative — CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow
In this excerpt of a Trend Micro Vulnerability Research Service report, Saran Neti and Sivathmican Sivakumaran of the Trend Micro Research Team detail a recent buffer overflow vulnerability in the Squid web proxy. A remote, unauthenticated attacker could…
Hashcatch: A script to capture handshakes of nearby wifi networks as you walk
down the street.
https://github.com/staz0t/hashcatch
down the street.
https://github.com/staz0t/hashcatch
GitHub
GitHub - staz0t/hashcatch: Capture handshakes of nearby WiFi networks automatically
Capture handshakes of nearby WiFi networks automatically - staz0t/hashcatch
WMImplant is a PowerShell based tool that leverages WMI to both perform actions against targeted machines, but also as the C2 channel for issuing commands and receiving results. WMImplant will likely require local administrator permissions on the targeted machine.
https://github.com/FortyNorthSecurity/WMImplant
https://github.com/FortyNorthSecurity/WMImplant
GitHub
GitHub - RedSiege/WMImplant: This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell…
This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/rem...
Escalating privileges with ACLs in Active Directory
https://blog.fox-it.com/2018/04/26/escalating-privileges-with-acls-in-active-directory/
https://blog.fox-it.com/2018/04/26/escalating-privileges-with-acls-in-active-directory/
Fox-IT International blog
Escalating privileges with ACLs in Active Directory
Researched and written by Rindert Kramer and Dirk-jan Mollema Introduction During internal penetration tests, it happens quite often that we manage to obtain Domain Administrative access within a f…
Testing Race Conditions in Web Applications
https://securingtomorrow.mcafee.com/business/testing-race-conditions-web-applications/
https://securingtomorrow.mcafee.com/business/testing-race-conditions-web-applications/
Datajack Proxy
Datajack Proxy a tool to intercept non-HTTP traffic between a native application and a server.
https://github.com/nccgroup/DatajackProxy
Datajack Proxy a tool to intercept non-HTTP traffic between a native application and a server.
https://github.com/nccgroup/DatajackProxy
GitHub
GitHub - nccgroup/DatajackProxy: Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms
Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms - nccgroup/DatajackProxy