๐ [ Burak Karaduman @krdmnbrk ]
Excited to share my new project: AttackRuleMap
This project maps #AtomicRedTeam simulations to open-source detection rules like #SigmaRules and #Splunk ESCU rules (maybe more in the future).
Currently for Windows, with plans to support more platforms.
๐ https://attackrulemap.netlify.app/
๐ฅ [ tweet ]
Excited to share my new project: AttackRuleMap
This project maps #AtomicRedTeam simulations to open-source detection rules like #SigmaRules and #Splunk ESCU rules (maybe more in the future).
Currently for Windows, with plans to support more platforms.
๐ https://attackrulemap.netlify.app/
๐ฅ [ tweet ]
๐10๐ฅ5
๐ [ NSG650 @nsg650 ]
New blog about bootkitting Windows.
Done in collab with @pdawg11239
๐ https://nsg650.github.io/blogs/29-12-2024.html
๐ฅ [ tweet ]
New blog about bootkitting Windows.
Done in collab with @pdawg11239
๐ https://nsg650.github.io/blogs/29-12-2024.html
๐ฅ [ tweet ]
๐3๐ฅ3
๐ [ SafeBreach @safebreach ]
Starting 2025 strong! Weโve developed a PoC exploit for CVE-2024-49112. Read the blog and check out the GitHub repo.
Blog:
๐ https://www.safebreach.com/blog/ldapnightmare-safebreach-labs-publishes-first-proof-of-concept-exploit-for-cve-2024-49112/
PoC:
๐ https://github.com/SafeBreach-Labs/CVE-2024-49112
๐ฅ [ tweet ]
Starting 2025 strong! Weโve developed a PoC exploit for CVE-2024-49112. Read the blog and check out the GitHub repo.
Blog:
๐ https://www.safebreach.com/blog/ldapnightmare-safebreach-labs-publishes-first-proof-of-concept-exploit-for-cve-2024-49112/
PoC:
๐ https://github.com/SafeBreach-Labs/CVE-2024-49112
๐ฅ [ tweet ]
๐ฅ9๐ฅฑ4๐3๐คฏ2
๐ [ Dirk-jan @_dirkjan ]
Few BloodHound python updates: LDAP channel binding is now supported with Kerberos auth (native) or with NTLM (custom ldap3 version). Furthermore, the BH CE collector now has its own pypi package and command. You can have both on the same system with pipx.
๐ https://github.com/dirkjanm/BloodHound.py
๐ฅ [ tweet ]
๐ https://ppn.snovvcrash.rocks/pentest/infrastructure/ad#setup
Few BloodHound python updates: LDAP channel binding is now supported with Kerberos auth (native) or with NTLM (custom ldap3 version). Furthermore, the BH CE collector now has its own pypi package and command. You can have both on the same system with pipx.
๐ https://github.com/dirkjanm/BloodHound.py
๐ฅ [ tweet ]
ัะพะถะต ะฝะตะดะฐะฒะฝะพ ะพะฑะฝะพะฒะปัะป ัะธััะธั ะฟะพ ะฑััััะพะผั ัะฐะทะฒะพัะฐัะธะฒะฐะฝะธั "ะฝะพะฒะพะณะพ" ะฑั
:๐ https://ppn.snovvcrash.rocks/pentest/infrastructure/ad#setup
๐ฅ10๐4
๐ [ Synacktiv @Synacktiv ]
You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from @b1two_ (now merged upstream).
Here is an example with ldeep using relayed authentication from HTTP to LDAPs.
๐ฅ [ tweet ]
You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from @b1two_ (now merged upstream).
Here is an example with ldeep using relayed authentication from HTTP to LDAPs.
๐ฅ [ tweet ]
๐ฅ8๐1
๐ [ t3l3machus @t3l3machus ]
New experimental tool for rapid extraction and analysis of Windows service configs and ACEs for potential PE candidates, removing the need for tools like accesschk.exe or other non-native binaries.
๐ https://github.com/t3l3machus/ACEshark
๐ฅ [ tweet ]
New experimental tool for rapid extraction and analysis of Windows service configs and ACEs for potential PE candidates, removing the need for tools like accesschk.exe or other non-native binaries.
๐ https://github.com/t3l3machus/ACEshark
๐ฅ [ tweet ]
๐ฅ11
๐ [ CICADA8Research @CICADA8Research ]
Read our new research and learn about MS UIA technology. You will explore the depths of COM, graphical elements in Windows and spy on WhatsApp, Telegram, Slack, and Keepass ๐ต๏ธโโ๏ธ๐ป
Blog:
๐ https://cicada-8.medium.com/im-watching-you-how-to-spy-windows-users-via-ms-uia-c9acd30f94c4
Tool:
๐ https://github.com/CICADA8-Research/Spyndicapped
๐ฅ [ tweet ]
SpyWare 2.0 ๐
Read our new research and learn about MS UIA technology. You will explore the depths of COM, graphical elements in Windows and spy on WhatsApp, Telegram, Slack, and Keepass ๐ต๏ธโโ๏ธ๐ป
Blog:
๐ https://cicada-8.medium.com/im-watching-you-how-to-spy-windows-users-via-ms-uia-c9acd30f94c4
Tool:
๐ https://github.com/CICADA8-Research/Spyndicapped
๐ฅ [ tweet ]
๐ฅ9๐6๐3๐คฏ2
๐ [ Adam Chester ๐ดโโ ๏ธ @_xpn_ ]
Achievement unlocked, my first blog with SoecterOps ๐ค This post looks at ADFS OAuth2 support, Device Registration, Enterprise PRT, and a brain dump of things that I didnโt want to leave sat on Notion.
๐ https://posts.specterops.io/adfs-living-in-the-legacy-of-drs-c11f9b371811
๐ฅ [ tweet ]
Achievement unlocked, my first blog with SoecterOps ๐ค This post looks at ADFS OAuth2 support, Device Registration, Enterprise PRT, and a brain dump of things that I didnโt want to leave sat on Notion.
๐ https://posts.specterops.io/adfs-living-in-the-legacy-of-drs-c11f9b371811
๐ฅ [ tweet ]
๐6
๐ [ Orange Tsai ๐ @orange_8361 ]
The detailed version of our #WorstFit attack is available now! ๐ฅ
Check it out! ๐
๐ https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/
๐ฅ [ tweet ][ quote ]
The detailed version of our #WorstFit attack is available now! ๐ฅ
Check it out! ๐
๐ https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/
๐ฅ [ tweet ][ quote ]
๐ฅ6๐3
๐ [ Nithin Chenthur Prabhu @Azr43lKn1ght ]
Introducing Rusty-PE-Packer: a sophisticated Windows PE packer written in Rust, featuring progressive masked RC4 encryption, VEH exploitation for ROP gadget execution via RIP manipulation, and injection into legitimate Windows processes.
๐ https://github.com/Azr43lKn1ght/Rusty-PE-Packer
๐ฅ [ tweet ]
Introducing Rusty-PE-Packer: a sophisticated Windows PE packer written in Rust, featuring progressive masked RC4 encryption, VEH exploitation for ROP gadget execution via RIP manipulation, and injection into legitimate Windows processes.
๐ https://github.com/Azr43lKn1ght/Rusty-PE-Packer
๐ฅ [ tweet ]
๐ฅ12
๐ [ Bnb @HulkOperator ]
Recently, Iโve been experimenting with Return Address Spoofing and developed a tool to call any WinAPI and spoof the return address.
For a deeper dive, check out my blog post:
๐ https://hulkops.gitbook.io/blog/red-team/x64-return-address-spoofing
๐ฅ [ tweet ]
Recently, Iโve been experimenting with Return Address Spoofing and developed a tool to call any WinAPI and spoof the return address.
For a deeper dive, check out my blog post:
๐ https://hulkops.gitbook.io/blog/red-team/x64-return-address-spoofing
๐ฅ [ tweet ]
๐ฅ7๐4
๐ [ Matt Ehrnschwender @M_alphaaa ]
Keeping the blog alive. For people who may be unaware, you can embed a file in a C/C++ program without needing to make a giant byte array in a header file for it. Kind of went a little bit overboard on the detail with this lol but it's pretty useful
๐ https://blog.cybershenanigans.space/posts/embedding-files-in-c-cpp-programs/
๐ฅ [ tweet ]
Keeping the blog alive. For people who may be unaware, you can embed a file in a C/C++ program without needing to make a giant byte array in a header file for it. Kind of went a little bit overboard on the detail with this lol but it's pretty useful
๐ https://blog.cybershenanigans.space/posts/embedding-files-in-c-cpp-programs/
๐ฅ [ tweet ]
๐ฅ7
This media is not supported in your browser
VIEW IN TELEGRAM
๐ [ MrAle98 @MrAle_98 ]
Finally finished to develop an exploit for CVE-2024-49138: vulnerability in CLFS.sys.
I'll provide a detailed analysis in a blog post.
๐ https://github.com/MrAle98/CVE-2024-49138-POC
๐ฅ [ tweet ]
Finally finished to develop an exploit for CVE-2024-49138: vulnerability in CLFS.sys.
I'll provide a detailed analysis in a blog post.
๐ https://github.com/MrAle98/CVE-2024-49138-POC
๐ฅ [ tweet ]
๐ฅ12๐1
๐ [ Synacktiv @Synacktiv ]
A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by @kalimer0x00.
๐ https://www.synacktiv.com/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections
๐ฅ [ tweet ]
A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by @kalimer0x00.
๐ https://www.synacktiv.com/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections
๐ฅ [ tweet ]
๐ฅ5๐1
๐ [ Cellebrite Labs @CellebriteLabs ]
We just released our lightweight IDA syncing solution, LabSync, on GitHub! ๐ LabSync uses YAML files in a git repo to sync your IDB with other researchers whenever you save it. Check it out:
๐ https://github.com/cellebrite-labs/LabSync
๐ฅ [ tweet ]
We just released our lightweight IDA syncing solution, LabSync, on GitHub! ๐ LabSync uses YAML files in a git repo to sync your IDB with other researchers whenever you save it. Check it out:
๐ https://github.com/cellebrite-labs/LabSync
๐ฅ [ tweet ]
๐ฅ4
๐ [ Rad @rad9800 ]
For those unable to get their hands on EDR software for reversing, TrendMicro kindly publishes their resources at:
๐ https://help.deepsecurity.trendmicro.com/software.html
It's possible to download and extract the on-prem appliance and explore to understand how EDRs (if you can even call it that) work.
๐ฅ [ tweet ]
For those unable to get their hands on EDR software for reversing, TrendMicro kindly publishes their resources at:
๐ https://help.deepsecurity.trendmicro.com/software.html
It's possible to download and extract the on-prem appliance and explore to understand how EDRs (if you can even call it that) work.
๐ฅ [ tweet ]
๐4
๐ [ Josh @passthehashbrwn ]
New blog from me on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that I identified in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan.
๐ https://securityintelligence.com/x-force/being-a-good-clr-host-modernizing-offensive-net-tradecraft/
๐ฅ [ tweet ]
New blog from me on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that I identified in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan.
๐ https://securityintelligence.com/x-force/being-a-good-clr-host-modernizing-offensive-net-tradecraft/
๐ฅ [ tweet ]
๐8๐ฅ3