Response Filter Denial of Service (RFDoS): shut down a website by triggering WAF rule
https://blog.sicuranext.com/response-filter-denial-of-service-a-new-way-to-shutdown-a-website
DumpDriver: this is an idea to load your driver before a boot-time Anti-cheat(vgk, faceit)
https://github.com/Oliver-1-1/DumpDriver
Visualizing ACLs with Adalanche
https://lsecqt.github.io/Red-Teaming-Army/active-directory/enumeration/visualizing-acls-with-adalanche/
IPPrintC2: PoC for using MS Windows printers for persistence / command and control via Internet Printing
https://github.com/Diverto/IPPrintC2
Side-by-Side with HelloJackHunter: Unveiling the Mysteries of WinSxS
https://blog.zsec.uk/hellojackhunter-exploring-winsxs
Read Remote Process Commandline BOF
BOF to read the startup arguments of a remote process, when provided a process ID (PID)
https://github.com/EspressoCake/ReadRemoteProcessCommandline_BOF
Crawl4AI: is a powerful, free web crawling service designed to extract useful information from web pages and make it accessible for large language models (LLMs) and AI applications
https://github.com/unclecode/crawl4ai
Offensive IoT for Red Team Implants - Part 1
https://www.blackhillsinfosec.com/offensive-iot-for-red-team-implants-part-1
Windows Memory Forensics
https://blog.cyber5w.com/anomalies-hunting-in-windows-memory-dump
RunasPy: is an utility to run specific processes with different permissions than the user's current logon provides using explicit credentials
https://github.com/rkbennett/RunAsPy
PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal. A prototype PoC for the automation of vulnerability analysis on targets running CData applications on an embedded Jetty server
https://github.com/Stuub/CVE-2024-31848-PoC
When "Phish-Proof" Gets Hooked
https://www.persistent-security.net/post/when-phish-proof-gets-hooked
A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by threat actors & those which have been incorporated into open-source user-mode rootkits
https://github.com/JanielDary/ELFieScanner
CVE-2024-2887: A Pwn2Own Winning Bug in Google Chrome
https://www.zerodayinitiative.com/blog/2024/5/2/cve-2024-2887-a-pwn2own-winning-bug-in-google-chrome
CVE-2024-21115: An Oracle VirtualBox LPE Used to Win Pwn2Own
https://www.zerodayinitiative.com/blog/2024/5/9/cve-2024-21115-an-oracle-virtualbox-lpe-used-to-win-pwn2own
SharpPersistSD:
A Post-Compromise granular, fully reflective, simple and convenient .NET library to embed persistency to persistency by abusing Security Descriptors of remote machines
https://github.com/cybersectroll/SharpPersistSD
call a webhook on opening Google doc
https://gist.github.com/radk2/45e729f5859d76197d8f7e6b53dd6d71
darkPulse: is a shellcode Packer written in go, used to generate a variety of shellcode loaders
https://github.com/fdx-xdf/darkPulse
Immoral Fiber: This repository contains two new offensive techniques using Windows Fibers
PoisonFiber (The first remote enumeration & Fiber injection capability POC tool)
PhantomThread (An evolved callstack-masking implementation)
https://github.com/JanielDary/ImmoralFiber
CVE-2024-24787-PoC On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive
https://github.com/LOURC0D3/CVE-2024-24787-PoC
DV_NEW: This is the combination of multiple evasion techniques. It is using direct syscalls to bypass user-mode EDR hooking and also to avoid static detection of syscalls instruction in stub I am using egg hunt technique
https://github.com/Offensive-Panda/DV_NEW
1,000,000 requests 2FA bypass
https://imwaiting18.medium.com/i-sent-1-000-000-requests-to-a-server-dcb6b41d5d7f
Inject DLLs into the Windows Explorer using icons
https://github.com/0xda568/IconJector
Devfile file write vulnerability in GitLab
https://gitlab-com.gitlab.io/gl-security/security-tech-notes/security-research-tech-notes/devfile