How To Find And Exploit Information Disclosure Vulnerabilities
shaikhminhaz1975/step-by-step-guide-to-finding-information-disclosure-vulnerabilities-7a2ee33a82cd" rel="nofollow">https://medium.com/@shaikhminhaz1975/step-by-step-guide-to-finding-information-disclosure-vulnerabilities-7a2ee33a82cd
[Shellcode x64] Find and execute WinAPI functions with Assembly
https://print3m.github.io/blog/x64-winapi-shellcoding
.NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit is loading a malicious DLL using Task Scheduler (MMC) to bypass UAC and getting admin privileges
https://github.com/Offensive-Panda/.NET_PROFILER_DLL_LOADING
Double Dipping Cheat Developer Gets Caught Red-Handed
https://www.cyberark.com/resources/threat-research-blog/double-dipping-cheat-developer-gets-caught-red-handed
Abusing PIM-related application permissions in Microsoft Graph - Part 1
https://www.emiliensocchi.io/abusing-pim-related-application-permissions-in-microsoft-graph-part-1
A tool for manual or automatic patch shellcode into binary file Oder to bypass AV
https://github.com/yj94/BinarySpy
Process Injection using Thread Name
https://github.com/hasherezade/thread_namecalling
Database Hacking with common SQL Injection commands
redfanatic7/database-hacking-with-common-sql-injection-commands-c33b049554fe" rel="nofollow">https://medium.com/@redfanatic7/database-hacking-with-common-sql-injection-commands-c33b049554fe
Deep Sea Phishing Pt. 1
https://posts.specterops.io/deep-sea-phishing-pt-1-092a0637e2fd
Advanced SQL Injection Techniques
https://github.com/ifconfig-me/SQL_Injection-Techniques
List of Directory Traversal/LFI Payloads
https://github.com/ifconfig-me/Directory-Traversal-Payloads
SOC Home Lab
dyavanapellisujal7/soc-home-lab-part-1-6309b5b91118">Part 1 ○● dyavanapellisujal7/soc-home-lab-part-2-2a0e1f3cdca6">Part 2 ○● dyavanapellisujal7/soc-home-lab-part-3-8832e8325e80">Part 3
WhatsApp trick: Android malware can impersonate PDF file
https://www.mobile-hacker.com/2024/07/23/whatsapp-trick-android-malware-can-impersonate-pdf-file
Goffloader: A pure Go implementation of an in-memory COFFLoader (and PE loader)
https://github.com/praetorian-inc/goffloader
How to Leverage PowerShell Profiles for Lateral Movement
https://practicalsecurityanalytics.com/how-to-leverage-powershell-profiles-for-lateral-movement
Specula - Turning Outlook Into a C2 With One Registry Change
https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change
Hellshazzard: Indirect Syscall implementation to bypass userland NTAPIs hooking
https://github.com/Faran-17/Hellshazzard
Threat Hunting - Suspicious Named pipes
https://mthcht.medium.com/threat-hunting-suspicious-named-pipes-a4206e8a4bc8
In the 3.3.5a WoW client there is a RCE that allows any private server owner to inject and run arbitrary code on your computer. This patcher will modify your WoW executable file to fix the exploit
https://github.com/stoneharry/RCEPatcher
CheckUACBypass.ps1 is a PowerShell script designed to test if certain executables can be used to bypass UAC
https://github.com/AngeTia/CheckUACBypass
BYOVD Technique Example using viragt64 driver
https://github.com/CyberSecurityUP/ProcessKiller-BYOVD
PoC for CVE-2024-40348 Bazaar v1.4.3 and prior
Will attempt to read /etc/passwd from target
https://github.com/bigb0x/CVE-2024-40348
JScripter: is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL
https://github.com/ifconfig-me/JScripter
How Almost Sacrificing a University Group Project led to a Microsoft Bug Bounty
pyrus369/how-almost-sacrificing-a-university-group-project-led-to-a-microsoft-bug-bounty-9801e0f8f006" rel="nofollow">https://medium.com/@pyrus369/how-almost-sacrificing-a-university-group-project-led-to-a-microsoft-bug-bounty-9801e0f8f006
Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables
https://github.com/TierZeroSecurity/edr_blocker
SessionExec allows you to execute specified commands in other Sessions on Windows Systems, either targeting a specific session ID or All sessions, with the option to suppress command output
https://github.com/Leo4j/SessionExec