Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode
https://github.com/Dump-GUY/EXE-or-DLL-or-ShellCode
Loading BOF & ShellCode without executable permission
https://github.com/HackerCalico/No_X_BOF-ShellCode
Analyse MSI files for vulnerabilities
https://github.com/CICADA8-Research/MyMSIAnalyzer
This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out
https://github.com/shaddy43/BrowserSnatch
Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve clipboard contents, log keystrokes, and install AnyDesk for persistent remote access
https://github.com/alexdhital/Infiltrax
Dump Kerberos tickets from the KCM database of SSSD
https://github.com/synacktiv/kcmdump
Car Hacking: The ultimate guide! — Part II
redfanatic7/car-hacking-the-ultimate-guide-part-ii-445fe022a07c" rel="nofollow">https://medium.com/@redfanatic7/car-hacking-the-ultimate-guide-part-ii-445fe022a07c
Teaching the Old .NET Remoting New Exploitation Tricks
https://code-white.com/blog/teaching-the-old-net-remoting-new-exploitation-tricks
Create your own custom implant
https://www.ribbiting-sec.info/posts/2024-07-31_implant
Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows
https://github.com/WKL-Sec/LayeredSyscall
Credential Disclosure in LastPass
https://certitude.consulting/blog/en/credential-disclosure-in-lastpass
Exploit for CVE-2024-36401 GeoServer RCE
https://github.com/Chocapikk/CVE-2024-36401
Outlook CVE-2024-21413 for RCE. Hacking through a letter
https://blog.injectexp.dev/outlook-cve-2024-21413-for-rce-hacking-through-a-letter/07/rce
URL Requester: is an advanced multi-protocol request tool designed for performing HTTP requests to multiple URLs with comprehensive support for proxy usage, rate limiting, and other advanced features
https://github.com/Mr-dark55/URL-RequESTER
Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application
https://github.com/0x6rss/WhatsApp-extension-manipulation-PoC
Passworld is a fully customizable wordlist generator
https://github.com/SilvestriF3/Passworld
Python3 rewrite of AsOutsider features of AADInternals
https://github.com/synacktiv/AADOutsider-py
This BOF can be used to identify processes that hold handles to a given file. This can be useful to identify which process is locking a file on disk
https://github.com/Octoberfest7/enumhandles_BOF
EchoStrike is a tool designed to generate undetectable reverse shells and perform process injection on Windows systems
https://github.com/stivenhacker/EchoStrike
A bunch of scripts to reduce friction when pentesting Active Directory from Linux
https://github.com/dadevel/impacket-zsh-integration
Windows AppLocker Driver LPE – CVE-2024-21338
https://www.crowdfense.com/windows-applocker-driver-lpe-vulnerability-cve-2024-21338
DeadPotato: is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges
https://github.com/lypd0/DeadPotato
Escalating Privileges in Google Cloud via Open Groups
https://www.netspi.com/blog/technical-blog/cloud-pentesting/escalating-privileges-in-google-cloud-via-open-groups
Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 1
https://www.zerodayinitiative.com/blog/2024/7/29/breaking-barriers-and-assumptions-techniques-for-privilege-escalation-on-windows-part-1
Local KDC for Windows: This is an example program that can run a Kerberos Key Distribution Center (KDC) on a Windows host and have Windows authenticate to that without joining it to a domain
https://github.com/jborean93/LocalKdc
DockerSpy: searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more
https://github.com/UndeadSec/DockerSpy
ICMTC Finals Digital Forensics Challenges
ELJoOker/icmtc-finals-digital-forensics-challenges-50d358ccf5c7" rel="nofollow">https://medium.com/@ELJoOker/icmtc-finals-digital-forensics-challenges-50d358ccf5c7