malicious repositories can execute remote code while cloning
https://www.openwall.com/lists/oss-security/2021/03/09/3
  https://www.openwall.com/lists/oss-security/2021/03/09/3
Playing in the (Windows) Sandbox
https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
  
  https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
Check Point Research
  
  Playing in the (Windows) Sandbox - Check Point Research
  Research By: Alex Ilgayev Introduction Two years ago, Microsoft released a new feature as a part of the Insiders build 18305 – Windows Sandbox. This sandbox has some useful specifications: Integrated part of Windows 10 (Pro/Enterprise). Runs on top of Hyper…
  Reproducing n-day vulnerabilities and writing N-day based fuzzer with Qiling 
https://devilinside.me/blogs/reproducing-ndays-qiling
  
  https://devilinside.me/blogs/reproducing-ndays-qiling
devilinside.me
  
  UNLEASH THE BEAST | THE FUTURE
  Expect memes, food for thoughts, tech guidelines and trash talk daily.
  Extracting and Diffing Windows Patches in 2020
https://wumb0.in/extracting-and-diffing-ms-patches-in-2020.html
  https://wumb0.in/extracting-and-diffing-ms-patches-in-2020.html
Antivirus Event Analysis Cheat Sheet v1.8
https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
  https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
Analyzing attacks taking advantage of the Exchange Server vulnerabilities
https://www.microsoft.com/security/blog/2021/03/25/analyzing-attacks-taking-advantage-of-the-exchange-server-vulnerabilities/
  
  https://www.microsoft.com/security/blog/2021/03/25/analyzing-attacks-taking-advantage-of-the-exchange-server-vulnerabilities/
Microsoft Security Blog
  
  Analyzing attacks taking advantage of the Exchange Server vulnerabilities | Microsoft Security Blog
  Microsoft continues to monitor and investigate attacks exploiting the recent on-premises Exchange Server vulnerabilities. As organizations recover from this incident, we continue to publish guidance and share threat intelligence to help detect and evict threat…
  Dumping LSASS in memory undetected using MirrorDump
https://www.pentestpartners.com/security-blog/dumping-lsass-in-memory-undetected-using-mirrordump/
  
  https://www.pentestpartners.com/security-blog/dumping-lsass-in-memory-undetected-using-mirrordump/
Pen Test Partners
  
  Dumping LSASS in memory undetected using MirrorDump | Pen Test Partners
  Introduction As I am sure some of you are aware from the occasional ramblings and screenshots on twitter, I am a big fan of .NET based offensive tooling. Not because it’s trendy or cool, but because of the development speed and ease of testing and debugging…
  An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
https://github.com/microsoft/CyberBattleSim
  
  https://github.com/microsoft/CyberBattleSim
GitHub
  
  GitHub - microsoft/CyberBattleSim: An experimentation and research platform to investigate the interaction of automated agents…
  An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments. - microsoft/CyberBattleSim
  An excel-centric approach for managing the MITRE ATT&CK® tactics and techniques.
https://github.com/RealityNet/attack-coverage
  
  https://github.com/RealityNet/attack-coverage
GitHub
  
  GitHub - RealityNet/attack-coverage: an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques
  an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques  - GitHub - RealityNet/attack-coverage: an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques
  The 
https://github.com/Forescout/project-memoria-detector
  
  project-memoria-detector tool aims to determine whether a target network device runs a specific embedded TCP/IP stack.https://github.com/Forescout/project-memoria-detector
GitHub
  
  GitHub - Forescout/project-memoria-detector
  Contribute to Forescout/project-memoria-detector development by creating an account on GitHub.
  Bypassing LSA Protection in Userland
https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/
  https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/
Building on the Shoulders of Giants: Combining TensorFlow and Rust
https://www.crowdstrike.com/blog/how-crowdstrike-combines-tensorflow-and-rust-for-performance/
  
  https://www.crowdstrike.com/blog/how-crowdstrike-combines-tensorflow-and-rust-for-performance/
crowdstrike.com
  
  How CrowdStrike Combines TensorFlow and Rust for Performance
  In this blog, we share our perspectives on combining Rust’s and TensorFlow's powerful capabilities to boost both memory performance and speed capability.
  Analysis of Chromium issue 1196683, 1195777
https://iamelli0t.github.io/2021/04/20/Chromium-Issue-1196683-1195777.html
  
  https://iamelli0t.github.io/2021/04/20/Chromium-Issue-1196683-1195777.html
iamelli0t’s blog
  
  Analysis of Chromium issue 1196683, 1195777
  On April 12, a code commit[1] in Chromium get people’s attention. This is a bugfix for some vulnerability in Chromium Javascript engine v8. At the same time, the regression test case regress-1196683.js for this bugfix was also submitted. Based on this regression…
  Remote Potato – From Domain User to Enterprise Admin
https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/
  
  https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/
Penetration Testing Lab
  
  Remote Potato – From Domain User to Enterprise Admin
  NTLM Relaying is an well-known technique that was mainly used in security assessments in order to establish some sort of foothold on a server in the network or used for privilege escalation scenari…
  repo contains information about EDRs that can be useful during red team exercise.
https://github.com/Mr-Un1k0d3r/EDRs
  
  https://github.com/Mr-Un1k0d3r/EDRs
GitHub
  
  GitHub - Mr-Un1k0d3r/EDRs
  Contribute to Mr-Un1k0d3r/EDRs development by creating an account on GitHub.