Reproducing n-day vulnerabilities and writing N-day based fuzzer with Qiling
https://devilinside.me/blogs/reproducing-ndays-qiling
https://devilinside.me/blogs/reproducing-ndays-qiling
devilinside.me
UNLEASH THE BEAST | THE FUTURE
Expect memes, food for thoughts, tech guidelines and trash talk daily.
Extracting and Diffing Windows Patches in 2020
https://wumb0.in/extracting-and-diffing-ms-patches-in-2020.html
https://wumb0.in/extracting-and-diffing-ms-patches-in-2020.html
Antivirus Event Analysis Cheat Sheet v1.8
https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
https://www.nextron-systems.com/2021/03/25/antivirus-event-analysis-cheat-sheet-v1-8/
Analyzing attacks taking advantage of the Exchange Server vulnerabilities
https://www.microsoft.com/security/blog/2021/03/25/analyzing-attacks-taking-advantage-of-the-exchange-server-vulnerabilities/
https://www.microsoft.com/security/blog/2021/03/25/analyzing-attacks-taking-advantage-of-the-exchange-server-vulnerabilities/
Microsoft Security Blog
Analyzing attacks taking advantage of the Exchange Server vulnerabilities | Microsoft Security Blog
Microsoft continues to monitor and investigate attacks exploiting the recent on-premises Exchange Server vulnerabilities. As organizations recover from this incident, we continue to publish guidance and share threat intelligence to help detect and evict threat…
Dumping LSASS in memory undetected using MirrorDump
https://www.pentestpartners.com/security-blog/dumping-lsass-in-memory-undetected-using-mirrordump/
https://www.pentestpartners.com/security-blog/dumping-lsass-in-memory-undetected-using-mirrordump/
Pen Test Partners
Dumping LSASS in memory undetected using MirrorDump | Pen Test Partners
Introduction As I am sure some of you are aware from the occasional ramblings and screenshots on twitter, I am a big fan of .NET based offensive tooling. Not because it’s trendy or cool, but because of the development speed and ease of testing and debugging…
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
https://github.com/microsoft/CyberBattleSim
https://github.com/microsoft/CyberBattleSim
GitHub
GitHub - microsoft/CyberBattleSim: An experimentation and research platform to investigate the interaction of automated agents…
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments. - microsoft/CyberBattleSim
An excel-centric approach for managing the MITRE ATT&CK® tactics and techniques.
https://github.com/RealityNet/attack-coverage
https://github.com/RealityNet/attack-coverage
GitHub
GitHub - RealityNet/attack-coverage: an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques
an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques - GitHub - RealityNet/attack-coverage: an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques
The
https://github.com/Forescout/project-memoria-detector
project-memoria-detector
tool aims to determine whether a target network device runs a specific embedded TCP/IP stack.https://github.com/Forescout/project-memoria-detector
GitHub
GitHub - Forescout/project-memoria-detector
Contribute to Forescout/project-memoria-detector development by creating an account on GitHub.
Bypassing LSA Protection in Userland
https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/
https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland/
Building on the Shoulders of Giants: Combining TensorFlow and Rust
https://www.crowdstrike.com/blog/how-crowdstrike-combines-tensorflow-and-rust-for-performance/
https://www.crowdstrike.com/blog/how-crowdstrike-combines-tensorflow-and-rust-for-performance/
crowdstrike.com
How CrowdStrike Combines TensorFlow and Rust for Performance
In this blog, we share our perspectives on combining Rust’s and TensorFlow's powerful capabilities to boost both memory performance and speed capability.
Analysis of Chromium issue 1196683, 1195777
https://iamelli0t.github.io/2021/04/20/Chromium-Issue-1196683-1195777.html
https://iamelli0t.github.io/2021/04/20/Chromium-Issue-1196683-1195777.html
iamelli0t’s blog
Analysis of Chromium issue 1196683, 1195777
On April 12, a code commit[1] in Chromium get people’s attention. This is a bugfix for some vulnerability in Chromium Javascript engine v8. At the same time, the regression test case regress-1196683.js for this bugfix was also submitted. Based on this regression…
Remote Potato – From Domain User to Enterprise Admin
https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/
https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/
Penetration Testing Lab
Remote Potato – From Domain User to Enterprise Admin
NTLM Relaying is an well-known technique that was mainly used in security assessments in order to establish some sort of foothold on a server in the network or used for privilege escalation scenari…
repo contains information about EDRs that can be useful during red team exercise.
https://github.com/Mr-Un1k0d3r/EDRs
https://github.com/Mr-Un1k0d3r/EDRs
GitHub
GitHub - Mr-Un1k0d3r/EDRs
Contribute to Mr-Un1k0d3r/EDRs development by creating an account on GitHub.
Domain Borrowing is a new method to hide your C2 traffic with CDN
https://github.com/Dliv3/DomainBorrowing
https://github.com/Dliv3/DomainBorrowing
GitHub
GitHub - Dliv3/DomainBorrowing: Domain Borrowing PoC
Domain Borrowing PoC. Contribute to Dliv3/DomainBorrowing development by creating an account on GitHub.
CVE-2021-31166: Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.
https://github.com/0vercl0k/CVE-2021-31166
https://github.com/0vercl0k/CVE-2021-31166
GitHub
GitHub - 0vercl0k/CVE-2021-31166: Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.
Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. - 0vercl0k/CVE-2021-31166
Credential Dumping cheatsheet
https://dl.packetstormsecurity.net/papers/general/credential_dumping.pdf
https://dl.packetstormsecurity.net/papers/general/credential_dumping.pdf