Remote Image Upload Leads to RCE (Inject Malicious Code to PHP-GD Image)
https://medium.com/@asdqwedev/remote-image-upload-leads-to-rce-inject-malicious-code-to-php-gd-image-90e1e8b2aada
https://medium.com/@asdqwedev/remote-image-upload-leads-to-rce-inject-malicious-code-to-php-gd-image-90e1e8b2aada
Medium
Remote Image Upload Leads to RCE (Inject Malicious Code to PHP-GD Image)
بسم الله الرحمن الرحيم
Microsoft Administrative Tier Model
https://windowssecurity.ca/2020/03/23/mitigate-credential-theft-with-administrative-tier-model/
https://windowssecurity.ca/2020/03/23/mitigate-credential-theft-with-administrative-tier-model/
Hypervisor From Scratch – Part 8: How To Do Magic With Hypervisor!
https://rayanfam.com/topics/hypervisor-from-scratch-part-8/
https://rayanfam.com/topics/hypervisor-from-scratch-part-8/
Rayanfam Blog
Hypervisor From Scratch – Part 8: How To Do Magic With Hypervisor!
We write about Windows Internals, Hypervisors, Linux, and Networks.
Win32k Smash the Ref
New Bug Class and Exploitation Techniques
https://www.ragestorm.net/Win32k%20Smash%20the%20Ref.pdf
https://github.com/gdabah/win32k-bugs/tree/master/SmashTheRef
New Bug Class and Exploitation Techniques
https://www.ragestorm.net/Win32k%20Smash%20the%20Ref.pdf
https://github.com/gdabah/win32k-bugs/tree/master/SmashTheRef
Universally Evading Sysmon and ETW
https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
Sandboxie Open Source Code is available for download
https://community.sophos.com/products/sandboxie/f/forum/119641/important-sandboxie-open-source-code-is-available-for-download
https://community.sophos.com/products/sandboxie/f/forum/119641/important-sandboxie-open-source-code-is-available-for-download
Windows Server 2008R2-2019 NetMan DLL Hijacking
https://itm4n.github.io/windows-server-netman-dll-hijacking/
https://itm4n.github.io/windows-server-netman-dll-hijacking/
itm4n’s blog
Windows Server 2008R2-2019 NetMan DLL Hijacking
What if I told you that all editions of Windows Server, from 2008R2 to 2019, are prone to a DLL Hijacking in the %PATH% directories? What if I also told you that the impacted service runs as NT AUTHORITY\SYSTEM and that the DLL loading can be triggered by…
Red Team Tactics: Utilizing Syscalls in C# - Prerequisite Knowledge
https://jhalon.github.io/utilizing-syscalls-in-csharp-1/
https://jhalon.github.io/utilizing-syscalls-in-csharp-1/
Jack Hacks
Red Team Tactics: Utilizing Syscalls in C# - Prerequisite Knowledge
Over the past year, the security community - specifically Red Team Operators and Blue Team Defenders - have seen a massive rise in both public and private utilization of System Calls in windows malware for post-exploitation activities, as well as for the…
Ordinal Numbers and VBA can be fun – who knew!
quick and easy AMSI bypass evades Defender
https://secureyourit.co.uk/wp/2020/04/15/ordinal-numbers-and-vba-can-be-fun-who-knew/
PoC: https://t.co/qerER0TSJ8?amp=1
quick and easy AMSI bypass evades Defender
https://secureyourit.co.uk/wp/2020/04/15/ordinal-numbers-and-vba-can-be-fun-who-knew/
PoC: https://t.co/qerER0TSJ8?amp=1
GitHub
rmdavy/AMSI_Ordinal_Bypass
Bypass AMSI and Defender using Ordinal Values. Contribute to rmdavy/AMSI_Ordinal_Bypass development by creating an account on GitHub.
Methodology for Static Reverse Engineering of Windows Kernel Drivers
https://posts.specterops.io/methodology-for-static-reverse-engineering-of-windows-kernel-drivers-3115b2efed83
https://posts.specterops.io/methodology-for-static-reverse-engineering-of-windows-kernel-drivers-3115b2efed83
Medium
Methodology for Static Reverse Engineering of Windows Kernel Drivers
Introduction
Introducing ROADtools - The Azure AD exploration framework
https://dirkjanm.io/introducing-roadtools-and-roadrecon-azure-ad-exploration-framework/
https://dirkjanm.io/introducing-roadtools-and-roadrecon-azure-ad-exploration-framework/
dirkjanm.io
Introducing ROADtools - The Azure AD exploration framework
Over the past 1.5 years I’ve been doing quite a lot of exploration into Azure AD and how it works under the hood. Azure AD is getting more and more common in enterprises, and thus securing it is becoming a bigger topic. Whereas the traditional Windows Server…