From Clipboard to Compromise: A PowerShell Self-Pwn
https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn
Attack Paths Into VMs in the Cloud
https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors
Exploit for CVE-2024-23692
Unauthenticated RCE Flaw in Rejetto HTTP File Server
https://github.com/0x20c/CVE-2024-23692-EXP
Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense
https://github.com/EvilBytecode/Keylogger
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability
https://www.mobile-hacker.com/2024/06/17/exfiltrate-sensitive-user-data-from-apps-on-android-12-and-13-using-cve-2024-0044-vulnerability
Bloxstrap-Persistance: modifies Bloxstrap's settings (Settings.json) to add persistent integrations, showcasing how applications can be exploited
https://github.com/EvilBytecode/Bloxstrap-Persistance
CVE-2024-20693: Windows cached code signature manipulation
https://sector7.computest.nl/post/2024-06-cve-2024-20693-windows-cached-code-signature-manipulation
DLL Jmping: Old Hollow Trampolines in Windows DLL Land
https://www.blackhillsinfosec.com/dll-jmping
Simple analyze about CVE-2024-30080 MSMQ RCE
https://whereisk0shl.top/post/simple-analyze-about-cve-2024-30080
A simple commandline application to automatically decrypt strings from Obfuscator protected binaries
https://github.com/cod3nym/Deobfuscar
CVE-2024-4577 Argument injection vulnerability in PHP
https://github.com/gotr00t0day/CVE-2024-4577
CVE-2024-24590 ClearML RCE & CMD PoC
https://github.com/diegogarciayala/CVE-2024-24590-ClearML-RCE-CMD-POC
Exploiting File Read Vulnerabilities in Gradio to Steal Secrets from Hugging Face Spaces
https://www.horizon3.ai/attack-research/disclosures/exploiting-file-read-vulnerabilities-in-gradio-to-steal-secrets-from-hugging-face-spaces
Mapping Snowflake’s Access Landscape
https://posts.specterops.io/mapping-snowflakes-access-landscape-3bf232251945
Section-based payload obfuscation technique for x64
https://github.com/pygrum/gimmick
Analysis of user password strength
https://securelist.com/passworde-brute-force-time
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability
https://github.com/scs-labrat/android_autorooter
Spoofing PowerShell Security Logs and Bypassing AMSI Without Reflection or Patching
https://bc-security.org/scriptblock-smuggling
ScriptBlock-Smuggling:
https://github.com/BC-SECURITY/ScriptBlock-Smuggling
Malware Development
Part 5: DLL injection into the process
Part 6: DLL hijacking
Part 7: Advanced Code Injection
Iconv, set the charset to RCE:
Exploiting the glibc to hack the PHP engine (part 2)
https://www.ambionics.io/blog/iconv-cve-2024-2961-p2
Abusing title reporting and tmux integration in iTerm2 for code execution
https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html
VBA: having fun with macros, overwritten pointers & R/W/X memory
https://adepts.of0x.cc/vba-hijack-pointers-rwa
Recon2024 Demo: Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible
https://github.com/tandasat/recon2024_demo
Hunting APT41 TTPs
https://montysecurity.medium.com/hunting-apt41-ttps-f47e9dd9a7d5
CVE-2024-30078 Windows Wi-Fi Driver RCE
Detection and Command Execution Script
https://github.com/alperenugurlu/CVE-2024-30078-
This repository was created in conjunction with a Packer Development Workshop held at x33fcon 2024 by S3cur3Th1sSh1t and eversinc33.
It contains the Slides of the presentation plus code snippets in different programming languages for offensive Packer Development
https://github.com/rtecCyberSec/Packer_Development
Search & Spoof: Abuse of Windows Search to Redirect to Malware
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/search-spoof-abuse-of-windows-search-to-redirect-to-malware
RdpStrike: Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP
https://github.com/0xEr3bus/RdpStrike