Утилита для автоматической генерации ROP-цепочек https://github.com/d4em0n/exrop
GitHub
GitHub - d4em0n/exrop: Automatic ROPChain Generation
Automatic ROPChain Generation. Contribute to d4em0n/exrop development by creating an account on GitHub.
Using RDP without GUI for lateral movement
https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3
https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3
Medium
Revisiting Remote Desktop Lateral Movement
It’s no secret that attackers are looking for new techniques to execute lateral movement. However, there are only a handful of publicly…
Forwarded from r0 Crew (Channel)
VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor https://github.com/changeofpace/VivienneVMM #exploitation #dukeBarman
GitHub
GitHub - changeofpace/VivienneVMM: VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.
VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor. - changeofpace/VivienneVMM
Using .NET with Aggressor scripting for automating of lateral movement & persistence
https://posts.specterops.io/move-faster-stay-longer-6b4efab9c644
https://posts.specterops.io/move-faster-stay-longer-6b4efab9c644
Medium
Move faster, Stay longer
Offensive operators typically have their set of “go to” post-exploitation tools and methodologies. Among these, is Cobalt Strike — a very…
.NET Scripting languages (Boolang) in Red Teaming
https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/
https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/
Black Hills Information Security, Inc.
Red Teamer's Cookbook: BYOI (Bring Your Own Interpreter) - Black Hills Information Security, Inc.
Marcello Salvati // This fairly lengthy blog post aims at providing Red Team Operators ideas on how to incorporate BYOI tradecraft into their own custom tooling and get those creative […]
Forwarded from r0 Crew (Channel)
Skeleton project for your own GRUB-based bootkit https://github.com/mgrube/GRUBKit #exploitation
GitHub
GitHub - mgrube/GRUBKit: Skeleton project for your own GRUB-based bootkit
Skeleton project for your own GRUB-based bootkit. Contribute to mgrube/GRUBKit development by creating an account on GitHub.
Critical Bluetooth Vulnerability in Android (CVE-2020-0022)
https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/
https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/
Insinuator.net
Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag
On November 3rd, 2019, we have reported a critical vulnerability affecting the Android Bluetooth subsystem. This vulnerability has been assigned CVE-2020-0022 and was now patched in the latest security patch from February 2020. The security impact is as follows:…
Forging SWIFT MT Payment Messages for fun and pr... research!
https://labs.f-secure.com/blog/forging-swift-mt-payment-messages
https://labs.f-secure.com/blog/forging-swift-mt-payment-messages
Network data manipulation on the fly
https://blog.redteam.pl/2020/02/network-data-manipulation-on-fly.html
https://blog.redteam.pl/2020/02/network-data-manipulation-on-fly.html
Official VirusTotal Plugin for IDA Pro 7
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html
Virustotal
Official VirusTotal Plugin for IDA Pro 7
ATTENTION : In order to use the content search functionality you will need to have access to VT Intelligence . If you want to jump str...
x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2
https://iwantmore.pizza/posts/x0rro.htmlDetecting Memory Corruption Bugs With HWASan
https://android-developers.googleblog.com/2020/02/detecting-memory-corruption-bugs-with-hwasan.html?m=1
https://android-developers.googleblog.com/2020/02/detecting-memory-corruption-bugs-with-hwasan.html?m=1
Android Developers Blog
Detecting Memory Corruption Bugs With HWASan
Posted by Evgenii Stepanov, Staff Software Engineer, Dynamic Tools Native code in memory-unsafe languages like C and C++ is often vuln...