FuncIn Unprotect Evasion Technique Demo: This demonstration showcases the utilization of FuncIn evasion technique for spawning a remote shell
https://github.com/Unprotect-Project/FuncInEvasionTechniqueDemo
CloakQuest3r: is a powerful Python tool meticulously crafted to uncover the true IP address of websites safeguarded by Cloudflare, a widely adopted web security and performance enhancement service
https://github.com/spyboy-productions/CloakQuest3r
UnlinkDLL: DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable
https://github.com/frkngksl/UnlinkDLL
Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang
https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram
Scaling your threat hunting operations with CrowdStrike and PSFalcon
https://blog.nviso.eu/2023/12/13/scaling-your-threat-hunting-operations-with-crowdstrike-and-psfalcon
HiddenDesktop: Create and enumerate hidden desktops
https://github.com/MalwareTech/HiddenDesktop
TPMSpoofer: Simple proof of concept kernel mode driver hooking tpm.sys dispatch to randomize any public key reads
https://github.com/SamuelTulach/tpm-spoofer
Story of the year: the impact of AI on cybersecurity
https://securelist.com/story-of-the-year-2023-ai-impact-on-cybersecurity
Try Hack me — Advent Of Cyber 2023 Day 9 Write Up — She sells C# shells by the C2shore
https://infosecwriteups.com/try-hack-me-advent-of-cyber-2023-day-8-write-up-she-sells-c-shells-by-the-c2shore-080ba26f4011
htb-authority: Exploiting authority from @hackthebox_eu involves cracking Ansible vault, messing with PWM, and two really neat twists on the ESC1 ADCS attack, where I'll generate and use a fake computer, and use Pass-The-Cert
https://0xdf.gitlab.io/2023/12/09/htb-authority
New payload to exploit Error-based SQL injection - Oracle database
https://www.mannulinux.org/2023/12/New-payload-to-exploit-Error-based-SQL-injection-Oracle-database.html
Cookie Monster BOF: Steal browser cookies for edge, chrome and firefox through a BOF or exe! Cookie-Monster will extract the WebKit master key, locate a browser process with a handle to the Cookies and Login Data files, copy the handle(s) and then filelessly download the target
https://github.com/KingOfTheNOPs/cookie-monster
Simple Shellcode Runner in Rust Language
https://github.com/CyberSecurityUP/shellcode-runner-rust
Pentesting with Secure LDAP and LDAP Channel Binding
https://rootsecdev.medium.com/pentesting-with-secure-ldap-and-ldap-channel-binding-fd5baa0f7345
Security Researcher Note: Cover various security approaches to attack techniques and also provides new discoveries about security breaches
https://github.com/LearningKijo/SecurityResearcher-Note
Monarch: is a C2 Framework designed to give implant developers the convenience of integrating with an existing backend, so that more time can be spent creating cutting-edge features and enhancing overall efficiency
https://github.com/pygrum/monarch
Twitter subdomain XSS + CSRF vulnerability
Clicking a crafted link or going to some crafted web pages would allow attackers to take over your account (posting, liking, updating your profile, deleting your account, etc.)
https://twitter.com/shoucccc/status/1734802168723734764
Abuse the CLR memory un(safety)
https://ipslav.github.io/2023-12-12-let-me-manage-your-appdomain
DirtyCLR: An App Domain Manager Injection DLL PoC on steroids with a clean Thread Call Stack and no direct WinAPI calls
https://github.com/ipSlav/DirtyCLR
Side-by-side comparison of the Windows and Linux (GNU dl) Loaders
https://github.com/ElliotKillick/windows-vs-linux-loader-architecture
PoolParty BOF: A beacon object file implementation of PoolParty Process Injection Technique
https://github.com/0xEr3bus/PoolPartyBof
Unmasking the Shadows: The Art of Threat Hunting in Defender for Identity
https://cyberdom.blog/2023/12/09/unmasking-the-shadows-the-art-of-threat-hunting-in-defender-for-identity
Hunting Volt Typhoon TTPs
https://montysecurity.medium.com/hunting-volt-typhoon-ttps-00329f3daae2
Proof of Concept (PoC) of 5G NR Attacks against commercial smartphones, CPE routers, USB Modems, etc
https://github.com/asset-group/5ghoul-5g-nr-attacks
Black Hat Europe 2023 slides
https://github.com/onhexgroup/Conferences/tree/main/Black%20Hat%20Europe%202023%20slides
Defender Exclusions Creator BOF
https://github.com/EspressoCake/Defender-Exclusions-Creator-BOF
Apt style exploitation of Chrome 0day CVE-2023-4357
https://github.com/OgulcanUnveren/CVE-2023-4357-APT-Style-exploitation
The Pool Party You Will Never Forget: New Process Injection Techniques Using Windows Thread Pools
https://www.safebreach.com/blog/process-injection-using-windows-thread-pools
PoolParty: A set of fully-undetectable process injection techniques abusing Windows Thread Pools
https://github.com/SafeBreach-Labs/PoolParty