OilRig’s persistent attacks using cloud service-powered downloaders
https://www.welivesecurity.com/en/eset-research/oilrig-persistent-attacks-cloud-service-powered-downloaders
Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains
https://unit42.paloaltonetworks.com/detecting-malicious-stockpiled-domains
TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793
https://www.fortinet.com/blog/threat-research/teamcity-intrusion-saga-apt29-suspected-exploiting-cve-2023-42793
Kerberos OPSEC: Offense & Detection Strategies for Red and Blue Team - Part 1 : Kerberoasting
https://www.intrinsec.com/kerberos_opsec_part_1_kerberoasting
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
https://github.com/knight0x07/DarkGate-Install-Script-via-DNS-TXT-Record
MilkBox: PoC of dumping EFI runtime drivers
https://github.com/0x00Alchemist/MilkBox
Atlassian Companion RCE Vulnerability Proof of Concept (CVE-2023-22524)
https://github.com/ron-imperva/CVE-2023-22524
Adcshunter: Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective
https://github.com/danti1988/adcshunter
Unravelling the Web: AI’s Tangled Web of Prompt Injection Woes
https://labs.nettitude.com/blog/artificial-intelligence/unravelling-the-web-ais-tangled-web-of-prompt-injection-woes
Spamming Microsoft 365 Like It’s 1995
https://www.blackhillsinfosec.com/spamming-microsoft-365-like-its-1995
FuncIn Unprotect Evasion Technique Demo: This demonstration showcases the utilization of FuncIn evasion technique for spawning a remote shell
https://github.com/Unprotect-Project/FuncInEvasionTechniqueDemo
CloakQuest3r: is a powerful Python tool meticulously crafted to uncover the true IP address of websites safeguarded by Cloudflare, a widely adopted web security and performance enhancement service
https://github.com/spyboy-productions/CloakQuest3r
UnlinkDLL: DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable
https://github.com/frkngksl/UnlinkDLL
Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang
https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram
Scaling your threat hunting operations with CrowdStrike and PSFalcon
https://blog.nviso.eu/2023/12/13/scaling-your-threat-hunting-operations-with-crowdstrike-and-psfalcon
HiddenDesktop: Create and enumerate hidden desktops
https://github.com/MalwareTech/HiddenDesktop
Lets Open(Dir) Some Presents: An Analysis of a Persistent Actor’s Activity
https://thedfirreport.com/2023/12/18/lets-opendir-some-presents-an-analysis-of-a-persistent-actors-activity
SMTP Smuggling - Spoofing E-Mails Worldwide
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide
PEAs: Process Enumeration alternatives that avoid the use of CreateToolhelp32Snapshot, Process32First, Process32Next WinAPIs to enumerate running processes on windows
https://github.com/Bl4ckM1rror/PEAs
Observed Exploitation Attempts of Struts 2 S2-066 Vulnerability (CVE-2023-50164)
https://www.akamai.com/blog/security-research/apache-struts-cve-exploitation-attempts
SharePoint Pre-Auth Code Injection RCE chain CVE-2023-29357 & CVE-2023-24955 PoC
https://gist.github.com/testanull/dac6029d306147e6cc8dce9424d09868
Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol
https://securelist.com/unveiling-nkabuse
Dashboard for Nuclei Results ProjectDiscovery Cloud Platform Integration
https://blog.projectdiscovery.io/dashboard-for-nuclei-results-projectdiscovery-cloud-platform-integration
Abusing Liftoff assembly and efficiently escaping from sbx
https://retr0.zip/blog/abusing-Liftoff-assembly-and-efficiently-escaping-from-sbx.html
CVE-2023-50164 Apache Struts RCE
https://github.com/jakabakos/CVE-2023-50164-Apache-Struts-RCE
CVE-2023-6553 Exploit V2: Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution
https://github.com/Chocapikk/CVE-2023-6553
Security Researcher Note: Cover various security approaches to attack techniques and also provides new discoveries about security breaches
https://github.com/LearningKijo/SecurityResearcher-Note
Monarch: is a C2 Framework designed to give implant developers the convenience of integrating with an existing backend, so that more time can be spent creating cutting-edge features and enhancing overall efficiency
https://github.com/pygrum/monarch
Twitter subdomain XSS + CSRF vulnerability
Clicking a crafted link or going to some crafted web pages would allow attackers to take over your account (posting, liking, updating your profile, deleting your account, etc.)
https://twitter.com/shoucccc/status/1734802168723734764
Abuse the CLR memory un(safety)
https://ipslav.github.io/2023-12-12-let-me-manage-your-appdomain
DirtyCLR: An App Domain Manager Injection DLL PoC on steroids with a clean Thread Call Stack and no direct WinAPI calls
https://github.com/ipSlav/DirtyCLR
Side-by-side comparison of the Windows and Linux (GNU dl) Loaders
https://github.com/ElliotKillick/windows-vs-linux-loader-architecture