Plus récents

RITA

Real Intelligence Threat Analytics is a framework for detecting command and control communication through network traffic analysis.

github.com/activecm/rita

HalosUnhooker

An unhooker that will help you to remove AVs/EDRs hooks from NT API.

github.com/GetRektBoy724/Halos

Simple tool called IOCTL_VOLSNAP_QUERY_NAMES_OF_SNAPSHOTS returns all snapshot, including hidden ones.

Afficher le fil de discussion

DLLirant

This tool automatize the DLL hijacking researches on a specified binary.

github.com/Sh0ckFR/DLLirant

DelegationBOF

This tool uses LDAP to check a domain for known abusable Kerberos delegation settings. Currently, it supports RBCD, Constrained, Constrained w/Protocol Transition, and Unconstrained Delegation checks.

github.com/IcebreakerSecurity/

몾 Artemis a partagé

CVE-2018-25032 could potentially allow a Denial-of-Service () attack. This bug was reported by Danilo Ramos of Eideticom, Inc. It has lain in wait 13 years before being found! The « bug » was introduced in zlib 1.2.2.2, with the addition of the Z_FIXED option.

github.com/madler/zlib/commit/

Impacket : It is now possible to add a computer account via SMB from a NTLM Relay with ntlmrelayx

github.com/SecureAuthCorp/impa

Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code. It is based on the lcscript project that extends ChaiScript with native Windows API call support. Mochi was built to allow remote loading of ChaiScript files that orchestrate lower level code and execute offensive actions with the Windows API.

github.com/shogunlab/Mochi

An explanation of SHA-1 hashes recorded in Amcache

  • Amcache registry hive

%WINDIR%\AppCompat\Programs\Amcache.hve

blog.nviso.eu/2022/03/07/amcac

Windows System Resource Usage Monitor (SRUM)

  • SRUM artifacts

%WINDIR%\System32\SRU\SRUDB.dat

forensafe.com/blogs/srudb.html

CVE-2022-0847

A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.

github.com/AlexisAhmed/CVE-202

Back in 2016, an exploit called Hot Potato was revealed and opened a Pandora's box of local privilege escalations at the window manufacturer. Over the next few years, Microsoft kept patching « Won't fix », which eventually got bypassed with new techniques, always bringing new potatoes.

The goal of this article is to present all the exploits from the first one to the last one, how they work and how to use it. So, let's dive into the incredible Mousline mash up of impersonations and privilege escalations.

hideandsec.sh/books/windows-sN

Plus anciens
nanao

Comme le soleil, les machines ne se couchent jamais.