Exploit development resources
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
GitHub
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
Reverse engineering focusing on x64 Windows. Contribute to 0xZ0F/Z0FCourse_ReverseEngineering development by creating an account on GitHub.
RED TEAM RESOURCS
https://hackersploit.org/red-team-reconnaissance-techniques/
https://syntricks.com/red-teaming
https://attack.mitre.org/
https://www.cyberwarfare.live/courses/certified-red-team-analyst
https://tryhackme.com/path/outline/redteaming
https://www.youtube.com/watch?v=BWaGnsRirtU
https://www.linode.com/docs/guides/hackersploit-red-team-series
NOTES
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
https://www.ired.team/
C2 SERVERS
USE OPEN SOURCE && FRIENDLY FOR BEGINNERS
https://github.com/cobbr/Covenant/
https://www.kali.org/tools/armitage/
https://hackersploit.org/red-team-reconnaissance-techniques/
https://syntricks.com/red-teaming
https://attack.mitre.org/
https://www.cyberwarfare.live/courses/certified-red-team-analyst
https://tryhackme.com/path/outline/redteaming
https://www.youtube.com/watch?v=BWaGnsRirtU
https://www.linode.com/docs/guides/hackersploit-red-team-series
NOTES
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
https://www.ired.team/
C2 SERVERS
USE OPEN SOURCE && FRIENDLY FOR BEGINNERS
https://github.com/cobbr/Covenant/
https://www.kali.org/tools/armitage/
HackerSploit Blog
Red Team Reconnaissance Techniques
Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel.
Malware development series
PART 1 - basics:
https://0xpat.github.io/Malware_development_part_1/
PART 2 - anti dynamic analysis & sandboxes:
https://0xpat.github.io/Malware_development_part_2/
PART 3 - anti-debugging:
https://0xpat.github.io/Malware_development_part_3/
PART 4 - antistatic analysis tricks:
https://0xpat.github.io/Malware_development_part_4/
PART 5 - tips & tricks:
https://0xpat.github.io/Malware_development_part_5/
PART 6 - advanced obfuscation with LLVM and template metaprogramming:
https://0xpat.github.io/Malware_development_part_6/
PART 7 - Secure Desktop:
https://0xpat.github.io/Malware_development_part_7/
PART 8 - COFF injection and in-memory execution:
https://0xpat.github.io/Malware_development_part_8/
PART 9 - hosting CLR and managed code injection:
https://0xpat.github.io/Malware_development_part_9/
PART 1 - basics:
https://0xpat.github.io/Malware_development_part_1/
PART 2 - anti dynamic analysis & sandboxes:
https://0xpat.github.io/Malware_development_part_2/
PART 3 - anti-debugging:
https://0xpat.github.io/Malware_development_part_3/
PART 4 - antistatic analysis tricks:
https://0xpat.github.io/Malware_development_part_4/
PART 5 - tips & tricks:
https://0xpat.github.io/Malware_development_part_5/
PART 6 - advanced obfuscation with LLVM and template metaprogramming:
https://0xpat.github.io/Malware_development_part_6/
PART 7 - Secure Desktop:
https://0xpat.github.io/Malware_development_part_7/
PART 8 - COFF injection and in-memory execution:
https://0xpat.github.io/Malware_development_part_8/
PART 9 - hosting CLR and managed code injection:
https://0xpat.github.io/Malware_development_part_9/
0xpat.github.io
Malware development part 1 - basics
Introduction
This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist.
Let’s…
This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist.
Let’s…
❤3
https://ift.tt/2ich1l7
Twitter Limits to Thwart Data Scraping
Twitter Limits to Thwart Data Scraping
Cyberwarzone
Twitter Limits to Thwart Data Scraping
There's been a bit of a shake-up on Twitter. None other than Elon Musk himself has come forward with a new measure aimed at tackling rampant data scraping and system manipulation.
The Musk Maneuver
As it stands, Twitter is facing some pretty intense…
The Musk Maneuver
As it stands, Twitter is facing some pretty intense…
https://github.com/Jasawn/python-instagram-story-visualiser
Instagram Instagram Story Visualizer – Extract location data on Instagram.
The tool reads stories and displays the location data of selected users on an interactive map with a user-friendly interface.
Instagram Instagram Story Visualizer – Extract location data on Instagram.
The tool reads stories and displays the location data of selected users on an interactive map with a user-friendly interface.
Millions of GitHub Repositories Are Vulnerable To RepoJacking
An attack called RepoJacking may potentially affect millions of GitHub repositories. If abused, this vulnerability might result in code execution on the internal networks of organizations or on the networks of their customers. This includes the repositories of companies like Google, Lyft, and many others. It has many high-quality targets that are vulnerable to attack. […]
The post Millions of GitHub Repositories Are Vulnerable To RepoJacking appeared first on GBHackers - Latest Cyber Security News | Hacker News....
Continue reading at GBHackers – Latest Cyber Security News | Hacker News
An attack called RepoJacking may potentially affect millions of GitHub repositories. If abused, this vulnerability might result in code execution on the internal networks of organizations or on the networks of their customers. This includes the repositories of companies like Google, Lyft, and many others. It has many high-quality targets that are vulnerable to attack. […]
The post Millions of GitHub Repositories Are Vulnerable To RepoJacking appeared first on GBHackers - Latest Cyber Security News | Hacker News....
Continue reading at GBHackers – Latest Cyber Security News | Hacker News
𝙃4𝙓-𝙏𝙤𝙤𝙡𝙨 🐲
Open source toolkit for scraping, OSINT and more
Link 🔗:-
https://github.com/V1li/H4X-Tools
Open source toolkit for scraping, OSINT and more
Link 🔗:-
https://github.com/V1li/H4X-Tools
GitHub
GitHub - vil/H4X-Tools: A modular, terminal-based toolkit for OSINT, reconnaissance, and scraping - built in Python, runs on Linux…
A modular, terminal-based toolkit for OSINT, reconnaissance, and scraping - built in Python, runs on Linux and Windows. - vil/H4X-Tools
👍2
Discord is spyware because it collects all information that passes through its communication platform. As Discord is a centralized communication platform, all communications have to go through Discord's official servers, where all of that information can potentially be recorded. The vast majority of said information has been confirmed to be recorded, such as all communications between users. Discord has also been confirmed to use other spyware features such as various forms of telemetry. Discord's main source of income is from investment, from which it has received over $279.3 million dollars. Discord cannot be built from source and the source code for Discord is unavailable.
https://spyware.neocities.org/articles/discord
https://spyware.neocities.org/articles/discord
❤2
Исследователь продемонстрировал деанонимизацию Tor-серверов через ETag
https://xakep.ru/2023/06/19/tor-etag/
https://xakep.ru/2023/06/19/tor-etag/
👍1
CVE-2023-35086 POC - ASUS routers format string vulnerability
July 25 2023, Altin (tin-z), github.com/tin-zBrief descriptionASUS RT-AX56U V2 & RT-AC86U router firmwares below or equal to version 3.0.0.4.386_50460 and 3.0.0.4_386_51529 respectively have a format string vulnerability in the detwan.cgi function of the httpd service that can cause code execution when an attacker constructs malicious data.
The vulnerability affects also other ASUS devices using httpd service.
Read here for more details.
references:PocThe vulnerability permits achieving RCE, meanwhile the PoC only achieves DoS, mainly because the firmware was emulated with QEMU and so the stack is different from the real case device.
Prerequisites:The value of 'Referer' header should contain the target's addresspoc_crash.pyvirtualenv --python=python3 .venv source .venv/bin/activate pip install hexdump python poc_crash.py --HOST ...
Continue reading at github.com (from /r/netsec)
July 25 2023, Altin (tin-z), github.com/tin-zBrief descriptionASUS RT-AX56U V2 & RT-AC86U router firmwares below or equal to version 3.0.0.4.386_50460 and 3.0.0.4_386_51529 respectively have a format string vulnerability in the detwan.cgi function of the httpd service that can cause code execution when an attacker constructs malicious data.
The vulnerability affects also other ASUS devices using httpd service.
Read here for more details.
references:PocThe vulnerability permits achieving RCE, meanwhile the PoC only achieves DoS, mainly because the firmware was emulated with QEMU and so the stack is different from the real case device.
Prerequisites:The value of 'Referer' header should contain the target's addresspoc_crash.pyvirtualenv --python=python3 .venv source .venv/bin/activate pip install hexdump python poc_crash.py --HOST ...
Continue reading at github.com (from /r/netsec)
👍1