Icebox is a Virtual Machine Introspection solution that enable you to stealthily trace and debug any process (kernel or user). It's based on project Winbagility.
https://github.com/thalium/icebox
https://github.com/thalium/icebox
GitHub
Winbagility/Winbagility
[ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;. Contribute to Winbagility/Winbagility development by creating an account on GitHub.
Offensive Development with GitHub Actions
https://www.mdsec.co.uk/2020/03/offensive-development-with-github-actions/
https://www.mdsec.co.uk/2020/03/offensive-development-with-github-actions/
MDSec
Offensive Development with GitHub Actions - MDSec
Introduction Actions is a CI/CD pipeline, built into GitHub, which was made generally available back in November 2019. Actions allows us to build, test and deploy our code based on triggers...
LDAPFragger: Command and Control over LDAP attributes
https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/
https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/
Fox-IT International blog
LDAPFragger: Command and Control over LDAP attributes
Written by Rindert Kramer Introduction A while back during a penetration test of an internal network, we encountered physically segmented networks. These networks contained workstations joined to t…
C2concealer: a C2 Malleable Profile Generator for Cobalt Strike
https://fortynorthsecurity.com/blog/introducing-c2concealer/
https://fortynorthsecurity.com/blog/introducing-c2concealer/
FortyNorth Security Blog
Introducing C2concealer: a C2 Malleable Profile Generator for Cobalt Strike
C2concealer is a python3 command-line tool that generates c2 malleable profiles for use with Cobalt Strike. Looking to get up and running quick? Code is available here. C2concealer: what's the story?Red team assessments and penetration tests involve a ton…
Remote Image Upload Leads to RCE (Inject Malicious Code to PHP-GD Image)
https://medium.com/@asdqwedev/remote-image-upload-leads-to-rce-inject-malicious-code-to-php-gd-image-90e1e8b2aada
https://medium.com/@asdqwedev/remote-image-upload-leads-to-rce-inject-malicious-code-to-php-gd-image-90e1e8b2aada
Medium
Remote Image Upload Leads to RCE (Inject Malicious Code to PHP-GD Image)
بسم الله الرحمن الرحيم
Microsoft Administrative Tier Model
https://windowssecurity.ca/2020/03/23/mitigate-credential-theft-with-administrative-tier-model/
https://windowssecurity.ca/2020/03/23/mitigate-credential-theft-with-administrative-tier-model/
Hypervisor From Scratch – Part 8: How To Do Magic With Hypervisor!
https://rayanfam.com/topics/hypervisor-from-scratch-part-8/
https://rayanfam.com/topics/hypervisor-from-scratch-part-8/
Rayanfam Blog
Hypervisor From Scratch – Part 8: How To Do Magic With Hypervisor!
We write about Windows Internals, Hypervisors, Linux, and Networks.
Win32k Smash the Ref
New Bug Class and Exploitation Techniques
https://www.ragestorm.net/Win32k%20Smash%20the%20Ref.pdf
https://github.com/gdabah/win32k-bugs/tree/master/SmashTheRef
New Bug Class and Exploitation Techniques
https://www.ragestorm.net/Win32k%20Smash%20the%20Ref.pdf
https://github.com/gdabah/win32k-bugs/tree/master/SmashTheRef