๐ [ Ido Veltzman @Idov31 ]
Weekly Nidhogg update
Driver hiding feature is also finished and live in the dev branch: :)
On the photos you can see the before and after in DriverView (From Nirsoft's tools)
๐ https://github.com/Idov31/Nidhogg/tree/dev
#infosec #CyberSecurity
๐ฅ [ tweet ]
Weekly Nidhogg update
Driver hiding feature is also finished and live in the dev branch: :)
On the photos you can see the before and after in DriverView (From Nirsoft's tools)
๐ https://github.com/Idov31/Nidhogg/tree/dev
#infosec #CyberSecurity
๐ฅ [ tweet ]
๐4
๐ [ WHOAMI @wh0amitz ]
To audit the security of read-only domain controllers, I created the SharpRODC project, a simple .NET tool for RODC-related misconfigurations.
๐ https://github.com/wh0amitz/SharpRODC
#infosec #redteam #cybersecurity #pentesting
๐ฅ [ tweet ]
To audit the security of read-only domain controllers, I created the SharpRODC project, a simple .NET tool for RODC-related misconfigurations.
๐ https://github.com/wh0amitz/SharpRODC
#infosec #redteam #cybersecurity #pentesting
๐ฅ [ tweet ]
๐ฅ3
๐ [ OtterHacker @OtterHacker ]
Majority of custom #GetProcAddress I found didn't handle well forwarded export, here is a snippet for #GetProcAddress and #GetModuleHandle that handle this edge case !
Feel free to use it !
๐ https://gist.github.com/OtterHacker/8abaf54694ef27b9e3d38dfe57f13bd3
๐ฅ [ tweet ]
Majority of custom #GetProcAddress I found didn't handle well forwarded export, here is a snippet for #GetProcAddress and #GetModuleHandle that handle this edge case !
Feel free to use it !
๐ https://gist.github.com/OtterHacker/8abaf54694ef27b9e3d38dfe57f13bd3
๐ฅ [ tweet ]
๐ฅฑ1
ะ ะฐะทะฒะตัะฝััั ะฟัะธะฒะฐัะฝัะน Gitea ะฝะฐ VPS-ะบะต ะทะฐ 5 ะผะธะฝัั? ะะทะธ ๐๐ป
ะััะธัั ะธ ะฟัะปะปะธัั ัะตะฟะตัั ะผะพะถะฝะพ ะฟะพ ัะฐะบะพะผั ัะตะผะพััั ๐๐ป
ะะฐะบ ะถะต ะฟะพั ะพัะพัะตะป ะดะตะฒะพะฟั ะฟัะธ ะบะพะฝัะตะนะฝะตัะธะทะฐัะธะธ...
#devops #git #gitea
$ docker run -d --name mysql-gitea -e MYSQL_ROOT_PASSWORD='my_mysql_root_pass' -v /opt/volume/mysql-gitea:/var/lib/mysql mysql:latest
$ docker container exec -it mysql-gitea bash
# mysql -u root -p'my_mysql_root_pass'
mysql> CREATE USER 'gitea-user'@'%' IDENTIFIED BY 'my_gitea_db_password';
mysql> CREATE DATABASE giteadb;
mysql> GRANT ALL PRIVILEGES ON giteadb.* TO 'gitea-user'@'%';
mysql> FLUSH PRIVILEGES;
mysql> ^DBye
# exit
$ docker run -d --name gitea -v /opt/volume/gitea:/data -p 127.0.0.1:3000:3000 -p 127.0.0.1:2222:22 -e VIRTUAL_HOST=mygitea.local -e VIRTUAL_PORT=3000 -e USER_UID=1001 -e USER_GID=1001 -e DB_TYPE=mysql -e DB_HOST=172.17.0.2:3306 -e DB_NAME=giteadb -e DB_USER=gitea-user -e DB_PASSWD='my_gitea_db_password' gitea/gitea:latest
$ socat TCP4-LISTEN:31337,bind=0.0.0.0,fork TCP4:127.0.0.1:2222
ะััะธัั ะธ ะฟัะปะปะธัั ัะตะฟะตัั ะผะพะถะฝะพ ะฟะพ ัะฐะบะพะผั ัะตะผะพััั ๐๐ป
$ git remote set-url origin '[git@mygitea.local:31337]:snovvcrash/HackThePlanet.git'
ะะฐะบ ะถะต ะฟะพั ะพัะพัะตะป ะดะตะฒะพะฟั ะฟัะธ ะบะพะฝัะตะนะฝะตัะธะทะฐัะธะธ...
#devops #git #gitea
๐7๐ฅ2
๐ [ XMander @checkymander ]
Setting up Nemesis can be daunting, I wrote a blog post detailing the exact steps you need to to go from a fresh Ubuntu 22.04 image to a running Nemesis setup.
Future posts, I'd like to go into operational usage of it with Mythic and other tools
๐ https://blog.checkymander.com/red%20team/tools/operations/Nemesis-Zero-To-Hero/
๐ฅ [ tweet ]
Setting up Nemesis can be daunting, I wrote a blog post detailing the exact steps you need to to go from a fresh Ubuntu 22.04 image to a running Nemesis setup.
Future posts, I'd like to go into operational usage of it with Mythic and other tools
๐ https://blog.checkymander.com/red%20team/tools/operations/Nemesis-Zero-To-Hero/
๐ฅ [ tweet ]
Forwarded from Zer0Day Lab
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Zer0Day Lab
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ [ Matt Eidelberg @Tyl0us ]
Long overdue but SourcePoint v3.0 is out now, with a ton of new features and bug fixes. With these changes, Initial access and Post-Ex activities with CobaltStrike can fly under the radar.
Check it out !
#redteam #netsec
๐ https://github.com/Tylous/SourcePoint/releases/tag/v3.0
๐ฅ [ tweet ]
Long overdue but SourcePoint v3.0 is out now, with a ton of new features and bug fixes. With these changes, Initial access and Post-Ex activities with CobaltStrike can fly under the radar.
Check it out !
#redteam #netsec
๐ https://github.com/Tylous/SourcePoint/releases/tag/v3.0
๐ฅ [ tweet ]
๐ฅ5
๐ [ Kurosh Dabbagh @_Kudaes_ ]
Call stack spoofing has reached Rust๐. I have rewritten Unwinder and it is now a complete and stable weaponization of SilentMoonWalk technique. I have also added support for indirect syscalls and will be adding new features very soon.
๐ https://github.com/Kudaes/Unwinder
๐ฅ [ tweet ]
Call stack spoofing has reached Rust๐. I have rewritten Unwinder and it is now a complete and stable weaponization of SilentMoonWalk technique. I have also added support for indirect syscalls and will be adding new features very soon.
๐ https://github.com/Kudaes/Unwinder
๐ฅ [ tweet ]
๐5
๐ [ SkelSec @SkelSec ]
As I'm getting more sponsors I can make time to deal with all the reorg necessary after the closure of Porchetta.
Another ex-porchetta exclusive repo has been published on Github: evilrdp
I have received good feedback from users about this one.
๐ https://github.com/skelsec/evilrdp
๐ฅ [ tweet ]
As I'm getting more sponsors I can make time to deal with all the reorg necessary after the closure of Porchetta.
Another ex-porchetta exclusive repo has been published on Github: evilrdp
I have received good feedback from users about this one.
๐ https://github.com/skelsec/evilrdp
๐ฅ [ tweet ]
๐ฅ7๐1
๐ [ Dirk-jan @_dirkjan ]
It's been quiet for a while around bloodhound Python, however I'm happy to share that I am now maintaining the project at my personal GitHub. The latest version fixes many bugs/issues, also thanks to the many PRs that were submitted (thanks all!).
๐ https://github.com/dirkjanm/bloodhound.py
๐ฅ [ tweet ]
It's been quiet for a while around bloodhound Python, however I'm happy to share that I am now maintaining the project at my personal GitHub. The latest version fixes many bugs/issues, also thanks to the many PRs that were submitted (thanks all!).
๐ https://github.com/dirkjanm/bloodhound.py
๐ฅ [ tweet ]
๐8
๐ [ Octoberfest7 @Octoberfest73 ]
It's not new, but good work deserves a shoutout regardless. Great article from @zyn3rgy on running tools from a Windows attack platform through a SOCKS proxy. Lots to be said for avoiding IOC's on target but still being able to leverage powerful tools.
๐ https://posts.specterops.io/proxy-windows-tooling-via-socks-c1af66daeef3
๐ฅ [ tweet ]
It's not new, but good work deserves a shoutout regardless. Great article from @zyn3rgy on running tools from a Windows attack platform through a SOCKS proxy. Lots to be said for avoiding IOC's on target but still being able to leverage powerful tools.
๐ https://posts.specterops.io/proxy-windows-tooling-via-socks-c1af66daeef3
๐ฅ [ tweet ]
๐ข1
๐ [ Rasta Mouse @_RastaMouse ]
๐ https://github.com/gatariee/Winton
"focus on stealth". Uses cmd.exe, CreateRemoteThread, RWX, unbacked memory, and 0x0 thread start addresses...
๐ฅ [ tweet ]
๐ https://github.com/gatariee/Winton
"focus on stealth". Uses cmd.exe, CreateRemoteThread, RWX, unbacked memory, and 0x0 thread start addresses...
๐ฅ [ tweet ]
yet another opsec c2๐6๐ฅ1
๐ [ SkelSec @SkelSec ]
Updates on all my projects:
All projects have been reorganized, the default branch names are now `main` for every project.
All projects -where applicable- now set up with github actions which freezes the examples as windows executables, and puts them on:
๐ https://foss.skelsecprojects.com/
๐ฅ [ tweet ]
Updates on all my projects:
All projects have been reorganized, the default branch names are now `main` for every project.
All projects -where applicable- now set up with github actions which freezes the examples as windows executables, and puts them on:
๐ https://foss.skelsecprojects.com/
๐ฅ [ tweet ]
๐ฅ5
๐ [ BlackSnufkin @BlackSnufkin42 ]
yet another AV killer tool using BYOVD
Now i am like the cool kids ๐ป
๐ https://github.com/BlackSnufkin/GhostDriver
๐ฅ [ tweet ]
yet another AV killer tool using BYOVD
Now i am like the cool kids ๐ป
๐ https://github.com/BlackSnufkin/GhostDriver
๐ฅ [ tweet ]
๐3
๐ [ Rad K. @rad9800 ]
I decided to wrap all the various features I PoC'd recently into one project to make it easier for you to use.
- No CRT
- Unhook from system32/knowndlls
- LL with work items
- Clear VEH, DLL notifs, HWBPs
- Compile time API hashing
- Configurable
- C++17
๐ https://github.com/rad9800/WTSRM2
๐ฅ [ tweet ]
I decided to wrap all the various features I PoC'd recently into one project to make it easier for you to use.
- No CRT
- Unhook from system32/knowndlls
- LL with work items
- Clear VEH, DLL notifs, HWBPs
- Compile time API hashing
- Configurable
- C++17
๐ https://github.com/rad9800/WTSRM2
๐ฅ [ tweet ]
๐5
๐ [ DisK0nn3cT @DisK0nn3cT ]
Just released an update to the ScrapedIn tool. This tool has been very handy on red team and social engineering engagements! Please submit any bugs and Iโll get them squared away.
๐ https://github.com/dchrastil/ScrapedIn
๐ฅ [ tweet ]
Just released an update to the ScrapedIn tool. This tool has been very handy on red team and social engineering engagements! Please submit any bugs and Iโll get them squared away.
๐ https://github.com/dchrastil/ScrapedIn
๐ฅ [ tweet ]
๐ฅ3
๐ [ daem0nc0re @daem0nc0re ]
To dive more advanced low layer things such as hypervisor, I'm reviewing Windows kernelmode rootkit techniques, and created a repositry for research and educational purpose.
More PoCs will be added later (filesystem/network mini-filter things especially).
๐ https://github.com/daem0nc0re/VectorKernel
๐ฅ [ tweet ]
To dive more advanced low layer things such as hypervisor, I'm reviewing Windows kernelmode rootkit techniques, and created a repositry for research and educational purpose.
More PoCs will be added later (filesystem/network mini-filter things especially).
๐ https://github.com/daem0nc0re/VectorKernel
๐ฅ [ tweet ]
๐7
๐ [ TrustedSec @TrustedSec ]
In our new #blog post, Senior Security Consultant @n00py1 shows us why you don't need a drawer full of fancy tools to pivot through networksโjust some Windows #OpenSSH magic. Read it now!
๐ https://hubs.ly/Q02b_c620
๐ฅ [ tweet ]
In our new #blog post, Senior Security Consultant @n00py1 shows us why you don't need a drawer full of fancy tools to pivot through networksโjust some Windows #OpenSSH magic. Read it now!
๐ https://hubs.ly/Q02b_c620
๐ฅ [ tweet ]
๐5๐ฅ1