hacker_trick | Unsorted

Telegram-канал hacker_trick - Hacker tricks

3151

CVEs🔰 Tools🛠 RedTeam📕

Subscribe to a channel

Hacker tricks

WIFI Credential Dumping
https://www.r-tec.net/r-tec-blog-wifi-credential-dumping.html

Читать полностью…

Hacker tricks

memhv: Minimalistic hypervisor with memory introspection capabilities
https://github.com/SamuelTulach/memhv

Читать полностью…

Hacker tricks

Dump lsass using only Native APIs by hand-crafting Minidump files (without MinidumpWriteDump!)
https://github.com/ricardojoserf/NativeDump

Читать полностью…

Hacker tricks

Rev-Shell: Basic script to generate reverse shell payloads, generally most used in ctf
https://github.com/washingtonP1974/Rev-Shell

Читать полностью…

Hacker tricks

From OneNote to RansomNote: An Ice Cold Intrusion
https://thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrusion

Читать полностью…

Hacker tricks

Lord Of The Ring0 - Part 6 | Conclusion
https://idov31.github.io/posts/lord-of-the-ring0-p6

Читать полностью…

Hacker tricks

ImageIO, the infamous iOS Zero Click Attack Vector
https://r00tkitsmm.github.io/fuzzing/2024/03/29/iOSImageIO

Читать полностью…

Hacker tricks

Chaining N-days to Compromise All: Part 2 — Windows Kernel LPE (a.k.a Chrome Sandbox Escape)
https://blog.theori.io/chaining-n-days-to-compromise-all-part-2-windows-kernel-lpe-a-k-a-chrome-sandbox-escape-44cb49d7a4f8

Читать полностью…

Hacker tricks

SharpConflux is a .NET application built to facilitate Confluence exploration
https://github.com/nettitude/SharpConflux

Читать полностью…

Hacker tricks

xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
https://github.com/amlweems/xzbot

Читать полностью…

Hacker tricks

This project aims to provide a fully functional, from-scratch alternative to the Cobalt Strike Beacon, providing transparency and flexibility to security professionals and enthusiasts.This project is not a reverse-engineered version of the Cobalt Strike Beacon, but a complete open source implementation. The "settings.h" file contains macros for the C2 configuration file and the user should complete it to their liking. Once you have your "settings.h" template ready, feel free to share and contribute
https://github.com/kyxiaxiang/Beacon_Source

Читать полностью…

Hacker tricks

TP-Link ER7206 Omada Gigabit VPN Router uhttpd freeStrategy Command injection Vulnerability
https://github.com/Mr-xn/CVE-2023-43482

Читать полностью…

Hacker tricks

FAQ on the xz-utils backdoor
https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27

Читать полностью…

Hacker tricks

assist in bug bounty and web application enumeration tasks
https://github.com/HernanRodriguez1/EnumParameter

Читать полностью…

Hacker tricks

Everything I Know About the Xz Backdoor
https://boehs.org/node/everything-i-know-about-the-xz-backdoor
backdoor in upstream xz/liblzma leading to ssh server compromise
https://www.openwall.com/lists/oss-security/2024/03/29/4

Читать полностью…

Hacker tricks

GraphSpy: The Swiss Army Knife for Attacking M365 & Entra
https://insights.spotit.be/2024/04/05/graphspy-the-swiss-army-knife-for-attacking-m365-entra

Читать полностью…

Hacker tricks

RCE through Unsafe .Net Deserialization in Windows Event Viewer which leads to UAC bypass
https://github.com/CsEnox/EventViewer-UACBypass

Читать полностью…

Hacker tricks

Persistence – DLL Proxy Loading
https://pentestlab.blog/2024/04/03/persistence-dll-proxy-loading

Читать полностью…

Hacker tricks

PassTester: is a tool for finding user passwords that are most vulnerable to dictionary attacks
https://github.com/Elymaro/PassTester

Читать полностью…

Hacker tricks

Earth Freybug Uses UNAPIMON for Unhooking Critical APIs
https://www.trendmicro.com/en_us/research/24/d/earth-freybug

Читать полностью…

Hacker tricks

Apple CPU encryption hack
https://www.kaspersky.com/blog/apple-cpu-encryption-vulnerability

Читать полностью…

Hacker tricks

Bypassing DOMPurify with good old XML
https://flatt.tech/research/posts/bypassing-dompurify-with-good-old-xml

Читать полностью…

Hacker tricks

Tapping into the potential of Memory Dump Emulation
https://blahcat.github.io/posts/2024/01/27/tapping-into-the-potential-of-memory-dump-emulation

Читать полностью…

Hacker tricks

NetScout: OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL
https://github.com/caio-ishikawa/netscout

Читать полностью…

Hacker tricks

SSHishing – Abusing Shortcut Files and the Windows SSH Client for Initial Access
https://redsiege.com/blog/2024/04/sshishing-abusing-shortcut-files-and-the-windows-ssh-client-for-initial-access

Читать полностью…

Hacker tricks

Beyond Detection SMB Staging for Antivirus Evasion
https://lsecqt.github.io/Red-Teaming-Army/malware-development/beyond-detection-smb-staging-for-antivirus-evasion

Читать полностью…

Hacker tricks

K8S and Docker Vulnerability Check for CVE-2024-3094
https://github.com/teyhouse/CVE-2024-3094
identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability
https://github.com/alokemajumder/CVE-2024-3094-Vulnerability-Checker-Fixer

Читать полностью…

Hacker tricks

An ssh honeypot with the XZ backdoor CVE-2024-3094
https://github.com/lockness-Ko/xz-vulnerable-honeypot

Читать полностью…

Hacker tricks

A list of useful tools for Malware Analysis
https://github.com/ashemery/malware-tools

Читать полностью…

Hacker tricks

64-bit Linux Assembly and Shellcoding
https://www.hackingarticles.in/64-bit-linux-assembly-and-shellcoding
SeeSeeYouExec: Windows Session Hijacking via CcmExec
https://cloud.google.com/blog/topics/threat-intelligence/windows-session-hijacking-via-ccmexec

Читать полностью…
Subscribe to a channel