A coverage-guided fuzzer targeting Hyper-V emulated devices, in the userland of Hyper-V root partition. Vulnerabilities in that layer coud lead to a guest to root partition escape. #windows #tools #informatique
🔓 How to crack pixelated images ? #tools #cyber #threats #software #informatique
Mirage is a powerful and modular framework dedicated to the security analysis of #wireless communications. #radio #tools #software #informatique
https://homepages.laas.fr/rcayre/mirage-documentation/index.html
Project Ares - PoC loader written in C/C++ based on the Transacted Hollowing technique. This loader injects a PE into a remote process. #tools #informatique
👾 Ghost in the Ethernet optic. Plumspace (plumspace.com
) Smart SFP's are a bit of a terrifying concept. SFP's are (until now apparently) actually quite simple devices that « simply » take input electrical signals and turn them into optical signalling, or carry them down a Direct Attach Cable (DAC). This smart-sfp can be configured to capture or hijack traffic in a bunch of ways. #network #devices #tools #informatique
GithubBackupAllRepos - A #Python script to #backup all repos (public or private) of a user. #git #tools #informatique
ShadowCoerce - MS-FSRVP coercion abuse PoC #python #tools #informatique
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory #tools #informatique
MirrorDump - Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory. #windows #tools #informatique
Investigation et géolocalisation avec Overpass Turbo #osint #geoint #tools #informatique
https://haax.fr/fr/writeups/osint-geoint/osint-flight-volume2-overpassturbo/
IRIS is a web collaborative platform for incident response analysts allowing to share investigations at a technical level. This project is in its early stage. It can already be used in production, but please set backups of the database and DO NOT expose the interface on the Internet. #tools #python #flask #nginx #informatique
Decryption utility for #Yaesu ham #radio #firmware images. #hamradio #tools #software #amateurradio #rust #informatique
Lnkbomb is used for uploading malicious shortcut files to insecure file shares. Malicious shortcut generator for collecting NTLM hashes #tools #python #informatique
CVE-2021-42287 & CVE-2021-42278 Scanner & Exploiter #tools #informatique
fileless-xec is enable to execute a remote binary on a local machine directly from memory without dropping them on disk #tools #informatique
GPUSleep - How to makes your Cobalt Strike beacon disappear into GPU memory (and eventually come back) #tools #informatique
gsudo is a Linux sudo equivalent for #Windows users #tools #informatique
SQLRecon is a C# MS-SQL toolkit designed for offensive reconnaissance & post-exploitation #tools #informatique
Picky PPID Spoofing - Parent Process ID (PPID) Spoofing is one of the techniques employed by #Windows #malware authors to blend in the target system. #tools #informatique
https://captmeelo.com//redteam/maldev/2021/11/22/picky-ppid-spoofing.html
sc(r)apy | full metal packets
> We Are the Borg
> You Will be Assimilated
> Resistance is Futile