1500$: CR/LF Injection
a13h1/1500-cr-lf-injection-0d2a75f02ef3" rel="nofollow">https://medium.com/@a13h1/1500-cr-lf-injection-0d2a75f02ef3
Abusing MiniFilter Altitude to blind EDR
https://tierzerosecurity.co.nz/2024/03/27/blind-edr.html
CspReconGo: is a command-line tool designed for cybersecurity analysts, web developers, and IT professionals
https://github.com/jhaddix/CSPReconGO
ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild
https://www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild
Hacking the Giant: How I Discovered Google’s Vulnerability and Hall of Fame Recognition
hncaga/hacking-the-giant-how-i-discovered-googles-vulnerability-and-hall-of-fame-recognition-694a9c18684a" rel="nofollow">https://medium.com/@hncaga/hacking-the-giant-how-i-discovered-googles-vulnerability-and-hall-of-fame-recognition-694a9c18684a
naively bypassing new memory scanning POCs
https://sillywa.re/posts/flower-da-flowin-shc
Process Hypnosis: Debugger assisted control flow hijack
https://github.com/CarlosG13/Process-Hypnosis-Debugger-assisted-control-flow-hijack
PoC Anti-Rootkit to uncover Windows Drivers/Rootkits mapped to Kernel Memory
https://github.com/eversinc33/unKover
Project that generates Malicious Office Macro Enabled Dropper for DLL SideLoading and Embed it in Lnk file to bypass MOTW
https://github.com/SaadAhla/dropper
Fake-SMS: How Deep Does the Rabbit Hole Really Go?
aleksamajkic/fake-sms-how-deep-does-the-rabbit-hole-really-go-17e25c42f986" rel="nofollow">https://medium.com/@aleksamajkic/fake-sms-how-deep-does-the-rabbit-hole-really-go-17e25c42f986
Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation (CVE-2023-36424)
https://github.com/Nassim-Asrir/CVE-2023-36424
Fortinet FortiClient EMS SQL Injection
https://github.com/horizon3ai/CVE-2023-48788
nimvoke: Indirect syscalls + DInvoke made simple
https://github.com/nbaertsch/nimvoke
Pwn2Own Vancouver 2024 - Day One Results
https://www.zerodayinitiative.com/blog/2024/3/20/pwn2own-vancouver-2024-day-one-results
Making desync attacks easy with TRACE
https://portswigger.net/research/trace-desync-attack
Kerberos II - Credential Access
part1: https://labs.lares.com/fear-kerberos-pt1
part2: https://labs.lares.com/fear-kerberos-pt2
Leak NTLM via Website tab in teams via MS Office
https://github.com/soufianetahiri/TeamsNTLMLeak
CVE-2024-1086 Linux kernel LPE
https://github.com/notselwyn/cve-2024-1086
SharePoint not so 0day
https://github.com/testanull/SharePoint-not-so-0day
Atexec-pro: Fileless atexec, no more need for port 445
https://github.com/Ridter/atexec-pro
Analyse, hunt and classify malware using .NET metadata
https://bartblaze.blogspot.com/2024/03/analyse-hunt-and-classify-malware-using.html
flower: a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor
https://github.com/xrombar/flower
This script Crawls the website and finds the URLs that contain html forms
https://github.com/dirtycoder0124/formcrawler
Proof of Concept script to exploit the authenticated SSTI+RCE in Grav CMS (CVE-2024-28116)
https://github.com/akabe1/Graver
Shellcode Loader is a common technique used to load malicious code into the target system's memory and execute them, often as part of malware
https://github.com/Cherno-x/MyShellcodeLoader
Perfect DLL Proxying using forwards with absolute paths
https://github.com/mrexodia/perfect-dll-proxy
Hacking Anything LLM via Reversing CVE’s(Duplicates)
https://basu-banakar.medium.com/hacking-anything-llm-via-reversing-cves-duplicates-4fbfde67463f
AzurEnum: Enumerate Microsoft Entra ID (Azure AD) fast
https://github.com/SySS-Research/azurenum
ADPT: Another Dll Proxying Tool is exactly what it sounds like, another tool that allows you to automate the exploitation of dll hijack/sideloading opportunities
https://github.com/Kudaes/ADPT
Pwned by the Mail Carrier
https://posts.specterops.io/pwned-by-the-mail-carrier-0750edfad43b
Abusing the DHCP Administrators Group to Escalate Privileges in Windows Domains
https://www.akamai.com/blog/security-research/abusing-dhcp-administrators-group-for-privilege-escalation-in-windows-domains