RouterOS Post Exploitation
a tool to help enable and maintain root shell access in RouterOS 3.x through the current release.
https://medium.com/tenable-techblog/routeros-post-exploitation-784c08044790
@sec_nerd_en
a tool to help enable and maintain root shell access in RouterOS 3.x through the current release.
https://medium.com/tenable-techblog/routeros-post-exploitation-784c08044790
@sec_nerd_en
Medium
RouterOS Post Exploitation
Shared Objects, RC Scripts, and a Symlink
Instagram Explorer tool: Find images by date on Instagram at particular locations,
#OSINT
https://buff.ly/2LoeQR2
#OSINT
https://buff.ly/2LoeQR2
OSINT Combine
Instagram Explorer | OSINT Combine
Release out-of-tree v1.0.0 ― kernel {module, exploit} development tool
https://github.com/jollheef/out-of-tree/releases/tag/v1.0.0
https://github.com/jollheef/out-of-tree/releases/tag/v1.0.0
GitHub
jollheef/out-of-tree
out-of-tree kernel {module, exploit} development tool - jollheef/out-of-tree
Windows 10 x64 1903 • 10.0.18362.113 (WinBuild.160101.0800) • Use After Free
https://cpr-zero.checkpoint.com/vulns/cprid-2132/
https://cpr-zero.checkpoint.com/vulns/cprid-2132/
CPR-Zero
CPR-Zero: CVE-2019-1159
Check Point Research Vulnerability Repository
https://github.com/projectzeroindia/CVE-2019-11510
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
GitHub
GitHub - projectzeroindia/CVE-2019-11510: Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510) - projectzeroindia/CVE-2019-11510
Windows oneliners to download remote payload and execute arbitrary code
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/amp/
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/amp/
arno0x0x
Windows oneliners to download remote payload and execute arbitrary code
In the wake of the recent buzz and trend in using DDE for executing arbitrary command lines and eventually compromising a system, I asked myself « what are the coolest command lines an a…
CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow
https://www.zerodayinitiative.com/blog/2019/8/22/cve-2019-12527-code-execution-on-squid-proxy-through-a-heap-buffer-overflow
https://www.zerodayinitiative.com/blog/2019/8/22/cve-2019-12527-code-execution-on-squid-proxy-through-a-heap-buffer-overflow
Zero Day Initiative
Zero Day Initiative — CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow
In this excerpt of a Trend Micro Vulnerability Research Service report, Saran Neti and Sivathmican Sivakumaran of the Trend Micro Research Team detail a recent buffer overflow vulnerability in the Squid web proxy. A remote, unauthenticated attacker could…
Hashcatch: A script to capture handshakes of nearby wifi networks as you walk
down the street.
https://github.com/staz0t/hashcatch
down the street.
https://github.com/staz0t/hashcatch
GitHub
GitHub - staz0t/hashcatch: Capture handshakes of nearby WiFi networks automatically
Capture handshakes of nearby WiFi networks automatically - staz0t/hashcatch
WMImplant is a PowerShell based tool that leverages WMI to both perform actions against targeted machines, but also as the C2 channel for issuing commands and receiving results. WMImplant will likely require local administrator permissions on the targeted machine.
https://github.com/FortyNorthSecurity/WMImplant
https://github.com/FortyNorthSecurity/WMImplant
GitHub
GitHub - RedSiege/WMImplant: This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell…
This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/rem...
Escalating privileges with ACLs in Active Directory
https://blog.fox-it.com/2018/04/26/escalating-privileges-with-acls-in-active-directory/
https://blog.fox-it.com/2018/04/26/escalating-privileges-with-acls-in-active-directory/
Fox-IT International blog
Escalating privileges with ACLs in Active Directory
Researched and written by Rindert Kramer and Dirk-jan Mollema Introduction During internal penetration tests, it happens quite often that we manage to obtain Domain Administrative access within a f…