I took over 10 Million Accounts, Easy API Hacking
https://ravaan21.medium.com/i-took-over-10-million-accounts-easy-api-hacking-89a7092abe40
A handy tool to explore various string encoding
https://github.com/unixzii/StringExplorer
Chunking CobaltStrike Payloads + Jump Method
https://github.com/DamonMohammadbagher/NativePayload_LocalCreateThread7
LockBit Attempts to Stay Afloat With a New Version
https://www.trendmicro.com/en_us/research/24/b/lockbit-attempts-to-stay-afloat-with-a-new-version
EPSS (Exploit Prediction Scoring System) is a framework used to assess the likelihood of a vulnerability being exploited
https://github.com/KaanSK/go-epss
AI ChatBot <= 4.8.9 - Unauthenticated SQL Injection via qc_wpbo_search_response
https://github.com/RandomRobbieBF/CVE-2023-5204
TP-Link NCXXX Authentication Bypass
https://ssd-disclosure.com/ssd-advisory-tp-link-ncxxx-authentication-bypass
Shelter: is a completely weaponized sleep obfuscation technique that allows to fully encrypt your in-memory payload making an extensive use of ROP
https://github.com/Kudaes/Shelter
Following MITRE's footsteps in analyzing malware behavior
https://blog.virustotal.com/2024/02/following-in-mitres-footsteps-and.html
SpawnWith: An experimental Beacon Object File (BOF) that provides an alternative to the spawnas and inject commands
https://github.com/rasta-mouse/SpawnWith
Account Takeover [It Looked Secure at First]
https://cristivlad.medium.com/account-takeover-it-looked-secure-at-first-f14a31cb7f5c
How I Hacked the Dutch Government: Exploiting an Innocent Image for Remote Code Execution
mukundbhuva/how-i-hacked-the-dutch-government-exploiting-an-innocent-image-for-remote-code-execution-df1fa936e46a" rel="nofollow">https://medium.com/@mukundbhuva/how-i-hacked-the-dutch-government-exploiting-an-innocent-image-for-remote-code-execution-df1fa936e46a
Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies
https://github.com/naksyn/Embedder
Beyond Process And Object Callbacks: An Unconventional Method
https://revers.engineering/beyond-process-and-object-callbacks-an-unconventional-method
XiebroC2: Multiplayer sports penetration testing graphical framework written in Go, supports lua plug-in extensions, customized multiple modules, customized shellcode, file management, process management, memory loading, reverse proxy and other functions
https://github.com/INotGreen/XiebroC2
A simple UM + KM example of how to bypass EAC CR3
https://github.com/kprprivate/EAC-CR3-BYPASS
Unveiling custom packers: A comprehensive guide
https://estr3llas.github.io/unveiling-custom-packers-a-comprehensive-guide
ADCSCoercePotato: Yet another technique for coercing machine authentication but specific for ADCS server
https://github.com/decoder-it/ADCSCoercePotato
This repository contains Resources for malware development using Rust
https://github.com/Whitecat18/Rust-for-Malware-Development
Hello Lucee! Let us hack Apple again?
https://blog.projectdiscovery.io/hello-lucee-let-us-hack-apple-again
CLRInjector: A PoC .NET-specific process injection tool
https://github.com/bananabr/CLRInjector
toxicache: Golang scanner to find web cache poisoning vulnerabilities in a list of URLs and test multiple injection techniques.
https://github.com/xhzeem/toxicache
TinyTurla-NG in-depth tooling and command and control analysis
https://blog.talosintelligence.com/tinyturla-ng-tooling-and-c2
muddy: is a static string obfuscation library, designed to provide an easy way of avoiding simple static binary analysis tools such as strings or YARA rules
https://github.com/orph3usLyre/muddy-waters
A modern dashboard exploit for the original Microsoft Xbox
https://github.com/XboxDev/endgame-exploit
A Proof of Concept to exploit an authentication bypass to add a new administrative user in ConnectWise ScreenConnect
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
Nuclei template and information about the PoC for CVE-2024-25600 The Bricks theme for WordPress is vulnerable to RCE
https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template
RustRedOps: is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust language
https://github.com/joaoviictorti/RustRedOps
FormThief: is a project designed for spoofing Windows desktop login applications using WinForms and WPF
https://github.com/mlcsec/FormThief
HTB: Drive learning some interesting SQLite injection to RCE methods on an unintended root path, There's also an IDOR vulnerability, some shared passwords, and a standard buffer overflow
https://0xdf.gitlab.io/2024/02/17/htb-drive
ZTE F660 Routers Authentication Bypass Leading to RCE
https://github.com/MaherAzzouzi/ZTE-F660-Exploit
Enable or Disable TokenPrivilege(s)
https://github.com/xvt-void/EnableAllTokenPrivs