hacker_trick | Unsorted

Telegram-канал hacker_trick - Hacker tricks

3151

CVEs🔰 Tools🛠 RedTeam📕

Subscribe to a channel

Hacker tricks

Taking a deep dive into SmokeLoader
https://farghlymal.github.io/SmokeLoader-Analysis

Читать полностью…

Hacker tricks

OWASP Top 10 explained (3) : SQL Injection
https://lab.scub.net/owasp-top-10-3-sql-injection-78a59edba83b

Читать полностью…

Hacker tricks

APT37's ROKRAT HWP Object Linking and Embedding
https://www.0x0v1.com/rearchive-rokrat-hwp

Читать полностью…

Hacker tricks

Bypass UAC Methods
https://blog.injectexp.dev/2024/03/02/bypass-uac-methods

Читать полностью…

Hacker tricks

SecretPixel: is a cutting-edge steganography tool designed to securely conceal sensitive information within images
https://github.com/x011/SecretPixel

Читать полностью…

Hacker tricks

Windows Local Privilege Escalation Cookbook
https://github.com/nickvourd/Windows-Local-Privilege-Escalation-Cookbook

Читать полностью…

Hacker tricks

Rise in Deceptive PDF: The Gateway to Malicious Payloads
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads

Читать полностью…

Hacker tricks

0-Click Account Takeover on Facebook
https://infosecwriteups.com/0-click-account-takeover-on-facebook-e4120651e23e

Читать полностью…

Hacker tricks

Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs
https://github.com/referefref/gitdoorcheck
How To Hunt For UEFI Malware Using Velociraptor
https://www.rapid7.com/blog/post/2024/02/29/how-to-hunt-for-uefi-malware-using-velociraptor

Читать полностью…

Hacker tricks

LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities
https://github.com/sea-erkin/log-snare

Читать полностью…

Hacker tricks

Exploiting CSP Wildcards for Google Domains
https://attackshipsonfi.re/p/exploiting-csp-wildcards-for-google

Читать полностью…

Hacker tricks

A collection of webshell
https://github.com/Peaky-XD/webshell

Читать полностью…

Hacker tricks

Disable Windows Defender
(+ UAC Bypass, + Upgrade to SYSTEM)
https://blog.injectexp.dev/2024/02/28/disable-windows-defender-uac-bypass-upgrade-to-system

Читать полностью…

Hacker tricks

ADCS ESC14 Abuse Technique
https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9

Читать полностью…

Hacker tricks

AndroidSuperInject: Injecting into SELinux-protected system service processes under root on Android
https://github.com/cs1ime/AndroidSuperInject

Читать полностью…

Hacker tricks

Passing arguments via rundll32.exe to function exported by DLL
https://stmxcsr.com/micro/rundll-parse-args.html

Читать полностью…

Hacker tricks

A Trip Down Memory Lane
https://gatari.dev/posts/a-trip-down-memory-lane

Читать полностью…

Hacker tricks

Automate evasion and compilation of tools
https://tierzerosecurity.co.nz/2024/03/03/teamcity-sharpwmi-evasion.html

Читать полностью…

Hacker tricks

Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762
https://github.com/BishopFox/cve-2024-21762-check
PoC for CVE-2023-50386
Apache Solr Backup/Restore APIs RCE
https://github.com/vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC

Читать полностью…

Hacker tricks

Noname: write shell code in windows
https://github.com/rbmm/Noname

Читать полностью…

Hacker tricks

Windows and AD Pentesting cheatsheet
https://github.com/AleHelp/Windows-Pentesting-cheatsheet

Читать полностью…

Hacker tricks

Wireshark Tutorial: Exporting Objects From a Pcap
https://unit42.paloaltonetworks.com/using-wireshark-exporting-objects-from-a-pcap

Читать полностью…

Hacker tricks

Linux Threat Hunting Persistence
https://matheuzsecurity.github.io/hacking/linux-threat-hunting-persistence

Читать полностью…

Hacker tricks

SharpLansweeperDecrypt:
Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance
https://github.com/Yeeb1/SharpLansweeperDecrypt

Читать полностью…

Hacker tricks

The Art of Domain Deception: Bifrost's New Tactic to Deceive Users
https://unit42.paloaltonetworks.com/new-linux-variant-bifrost-malware

Читать полностью…

Hacker tricks

OffensiveLAM: A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or BRC4
https://github.com/vysecurity/OffensiveLAM

Читать полностью…

Hacker tricks

How to make a Keylogger Payload Undectatable
Scofield_Idehen/how-to-make-a-keylogger-payload-undectatable-99840e404d45" rel="nofollow">https://medium.com/@Scofield_Idehen/how-to-make-a-keylogger-payload-undectatable-99840e404d45

Читать полностью…

Hacker tricks

Navigating the Cloud: Exploring Lateral Movement Techniques
https://unit42.paloaltonetworks.com/cloud-lateral-movement-techniques

Читать полностью…

Hacker tricks

Xeno-RAT: is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system management. Has features such as HVNC, live microphone, reverse proxy, and much more!
https://github.com/moom825/xeno-rat

Читать полностью…

Hacker tricks

Leaking ObjRefs to Exploit HTTP .NET Remoting
https://code-white.com/blog/leaking-objrefs-to-exploit-http-dotnet-remoting

Читать полностью…
Subscribe to a channel