IronSharpPack: is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then reflective load the C# project
https://github.com/BC-SECURITY/IronSharpPack
CVE-2024-21338: Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled
https://github.com/hakaioffsec/CVE-2024-21338
Using the LockBit builder to generate targeted ransomware
https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware
How I got JS Execution (DOM XSS) Via CSTI
amrkadry7/how-i-got-js-execution-dom-xss-via-csti-58a4171c2963" rel="nofollow">https://medium.com/@amrkadry7/how-i-got-js-execution-dom-xss-via-csti-58a4171c2963
Horus: is an all-in-one encompassing tool for investigations assistance, from API leveraging to compiling data too
https://github.com/6abd/horus
CVE-2024-26817: Potential Integer Overflow Leading To Heap Overflow in AMD KFD
https://github.com/MaherAzzouzi/CVE-2024-26817-amdkfd
WAREED-DNS-C2: is a Command and Control (C2) that utilizes the DNS protocol for secure communications between the server and the target
https://github.com/Faisal-P27/WAREED-DNS-C2
A collection of awesome one-liners for bug bounty hunting
https://github.com/0xPugal/One-Liners
A trick, the story of exploiting CVE-2024-26230 - Windows EoP - bypassing XFG
https://whereisk0shl.top/post/a-trick-the-story-of-cve-2024-26230
CVE-2024-20670 Report
"New Outlook" NTLM Leak and File Execution
https://mpizzicaroli.github.io/missfile
obfus.h: is a macro-only library for compile-time obfuscating C applications, designed specifically for the Tiny C (tcc).
It is tailored for Windows x86 and x64 platforms and supports all versions of the compiler
https://github.com/DosX-dev/obfus.h
GhostInjector: proof of concept dll injector which injects without a process handle, and with a thread handle instead
https://github.com/li4321/GhostInjector
Wordpress Penetration Testing
https://www.hackingdream.net/2024/04/wordpress-penetration-testing.html
Voipire: scans and exploits the RTP bleed vulnerability
https://github.com/CR-DMcDonald/voipire
HTB CTF: Cracking Passwords with Hashcat
https://infosecwriteups.com/htb-ctf-cracking-passwords-with-hashcat-6a932514e5c8
DceRPC-OS-Info: Golang implements obtaining Windows remote host information through dcerpc and ntlmssp
https://github.com/W01fh4cker/DceRPC-OS-Info
Story of a strange IDOR without ID
https://m7arm4n.medium.com/story-of-a-strange-idor-without-id-6735fd3dcd27
Unauthorized Admin Account Access via Google Authentication
https://nullr3x.medium.com/unauthorized-admin-account-access-via-google-authentication-a38d42577ac9
Understanding ETW Patching
https://jsecurity101.medium.com/understanding-etw-patching-9f5af87f9d7b
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400
https://unit42.paloaltonetworks.com/cve-2024-3400
HSC24RedTeamInfra:
Slides and Codes used for the workshop Red Team Infrastructure Automation
https://github.com/dazzyddos/HSC24RedTeamInfra
certReport: A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report
https://github.com/Squiblydoo/certReport
CreateRCE — Yet Another Vulnerability in CreateUri [Zero click RCE in Outlook]
https://www.akamai.com/blog/security-research/2024/apr/critical-vulnerability-create-uri-remote-code-execution
CVE-2024-3400: PAN-OS Firewall Exploit Script
https://github.com/DrewskyDev/CVE-2024-3400
gelion bypass: is a tool designed to bypass the authentication system of "keyauth" whilst also dumping
https://github.com/byte2mov/gelion-bypass
DLL code for testing CVE-2024-21378 in MS Outlook
https://gist.github.com/Homer28/7f3559ff993e2598d0ceefbaece1f97f
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5
https://github.com/YuriiCrimson/ExploitGSM/
Havoc C2 Framework – A Defensive Operator’s Guide
https://www.immersivelabs.com/blog/havoc-c2-framework-a-defensive-operators-guide
Magic Bytes in Cybersecurity
Hackhoven/magic-bytes-in-cybersecurity-05e997a2c22e" rel="nofollow">https://medium.com/@Hackhoven/magic-bytes-in-cybersecurity-05e997a2c22e