Initial Access – search-ms URI Handler
https://pentestlab.blog/2024/01/02/initial-access-search-ms-uri-handler
Hide and Seek in Windows' Closet: Unmasking the WinSxS Hijacking Hideout
https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout
Compression using RDP API
https://gist.github.com/odzhan/56eb105a611dcdebd1d3a084c7312190
December 2023 BattlEye shellcode dump
https://github.com/SamuelTulach/be_shellcode_dump
The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools
https://github.com/hackerhouse-opensource/Marble
A CIA tradecraft technique to asynchronously detect when a process is created using WMI
https://github.com/hackerhouse-opensource/WMIProcessWatcher
A small program written in C that is designed to load 32-bit shellcode and allow for execution or debugging
https://github.com/jstrosch/sclauncher
40,000+ Nuclei templates for security scanning and detection across diverse web applications and services
https://github.com/linuxadi/40k-nuclei-templates
Keres: a is Powershell rev-shell backdoor with persistence
https://github.com/ELMERIKH/Keres
Operation Triangulation: The last (hardware) mystery
https://securelist.com/operation-triangulation-the-last-hardware-mystery
secbutler: The perfect butler for pentesters, bug-bounty hunters and security researchers
https://github.com/groundsec/secbutler
This is a POC for a CLR sleep obfuscation attempt
It use IHostMemoryManager interface to control the memory allocated by the CLR
https://github.com/lap1nou/CLR_Heap_encryption
The Google 0-day all Infostealer groups are exploiting
https://www.infostealers.com/article/the-0-day-all-infostealer-groups-are-exploiting
Def1nit3lyN0tAJa1lbr3akTool: A jailbreak tool for all arm64 devices on iOS 16.0 to iOS 16.5
https://github.com/KpwnZ/Def1nit3lyN0tAJa1lbr3akTool
vs-shellcode: Shellcode template is an Visual Studio in C++ to make shellcode on windows
https://github.com/RtlDallas/vs-shellcode
MITMonster: A monster cheatsheet on MITM attacks
https://github.com/wearecaster/MITMonster
Unmasking RedLine Stealer
https://www.infostealers.com/article/unmasking-redline-stealer
Artillery: CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator
https://github.com/hackerhouse-opensource/Artillery
Active Directory Pentesting from Linux
https://tbhaxor.com/active-directory-pentesting-from-linux
This PoC creates multiple processes, where each process performs a specific task as part of the injection operation
https://github.com/Maldev-Academy/Christmas
Infostealer Exploit and the Enigma of Cookie Restoration
https://www.infostealers.com/article/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration
SignToolEx: uses Microsoft Detours hooking library to hijack "signtool.exe" and modify expired code-signing certificates to appear valid, allowing to codesign without changing system clock
https://github.com/hackerhouse-opensource/SignToolEx
POC usermode <=> kernel communication via ALPC
https://github.com/pTerrance/alpc-km-um
New payloads to exploit Error-based SQL injection - PostgreSQL database
https://www.mannulinux.org/2023/12/New-payloads-to-exploit-Error-based-SQL-injection-PostgreSQL-database.html
How I Found SQL Injection worth of $4,000 bounty
https://roberto99.medium.com/how-i-found-sql-injection-worth-of-4-000-bounty-16ca09cbf8ec
EDRception: PoC for abusing exception handlers to hook and bypass user mode EDR hooks
https://github.com/MalwareTech/EDRception
Simple Memory Patcher Made With API Hooking
https://github.com/idkhidden/Memory-Patcher
Probuster: A Python based Web Application Penetration testing tool for Information Gathering
https://github.com/sanjai-AK47/Probuster
Silly EDR Bypasses and Where To Find Them
https://malwaretech.com/2023/12/silly-edr-bypasses-and-where-to-find-them