Plus récents

🛠 DeathSleep

PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.

there is no need to spoof the stack… if there is no stack

github.com/janoglezcampos/Deat

🛠 Aperi'Solve

Platform which performs layer on image. It uses zsteg, steghide, outguess, exiftool, binwalk, foremost and strings for deeper analysis.

aperisolve.com

🛠 pretender

Cross-platform tool to obtain a MitM position inside Windows networks in the spirit of Responder and mitm6. It implements local name resolution spoofing using the mDNS, LLMNR, and NetBIOS-NS protocols as well as a DHCPv6 DNS takeover attack.

github.com/RedTeamPentesting/p

🇩🇪 Security experts from paluno (paluno.uni-due.de) have developed a new technique that, for the first time, enables fuzz testing of protected memory areas in modern processors.

All tested fingerprint drivers as well as wallets for storing cryptocurrency were affected. Someone could exploit these vulnerabilities to read biometric data or steal the entire balance of the stored cryptocurrency.

uni-due.de/2022-07-15-security

La chaîne inCyber vous permet désormais d'explorer quantité de vidéos relatives au FIC 2022 (forum-fic.com). Bonne découverte.

🛠 Game Of Active Directory

GOAD is a vulnerable Active Directory environement for pentesters.

github.com/Orange-Cyberdefense

🛠 DFSCoerce : PoC for MS-DFSNM coerce authentication using NetrDfsRemoveStdRoot() method

github.com/Wh04m1001/DFSCoerce

🛠 DeepSleep is a variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC.

github.com/thefLink/DeepSleep

🛠 Hayabusa is a sigma-based threat hunting and fast forensics timeline generator for EVTX files.

github.com/Yamato-Security/hay

🛠 Get-UnJlaive is a tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.

github.com/Dump-GUY/Get-UnJlai

Plus anciens