π [ ReconOne_, ReconOne ]
Want to scan for the TOP Exploited Vulnerabilities according to CISA? Try this π
Credits: @pdiscoveryio
#nuclei #CISA #attacksurface #recon #reconone #bugbountytips #recontips
π₯ [ tweet ]
Want to scan for the TOP Exploited Vulnerabilities according to CISA? Try this π
Credits: @pdiscoveryio
#nuclei #CISA #attacksurface #recon #reconone #bugbountytips #recontips
π₯ [ tweet ]
π [ SagieSec, Sagie Dulce ]
#RPCFirewall version 2.0 is out!
Watch this tutorial that shows how to set it up, and start protecting against various RPC attacks : #petitpotam, #psexec, #dcsync, #wmic and more...
New features:
βοΈ Support RPC Filters.
βοΈ RPC Firewall as a service
βοΈ Monitor & protect new processes
βοΈ "Status" command for detailed deployment info
βοΈ Better resolution of source host and port
π https://youtu.be/BNzfmYwkioY
π https://github.com/zeronetworks/rpcfirewall
π₯ [ tweet ]
#RPCFirewall version 2.0 is out!
Watch this tutorial that shows how to set it up, and start protecting against various RPC attacks : #petitpotam, #psexec, #dcsync, #wmic and more...
New features:
βοΈ Support RPC Filters.
βοΈ RPC Firewall as a service
βοΈ Monitor & protect new processes
βοΈ "Status" command for detailed deployment info
βοΈ Better resolution of source host and port
π https://youtu.be/BNzfmYwkioY
π https://github.com/zeronetworks/rpcfirewall
π₯ [ tweet ]
π [ DebugPrivilege, β’ ]
Alert when a group is added to a sensitive Active Directory group https://t.co/2oJmjthu8G
π https://techcommunity.microsoft.com/t5/security-compliance-and-identity/alert-when-a-group-is-added-to-a-sensitive-active-directory/ba-p/3436868
π₯ [ tweet ]
Alert when a group is added to a sensitive Active Directory group https://t.co/2oJmjthu8G
π https://techcommunity.microsoft.com/t5/security-compliance-and-identity/alert-when-a-group-is-added-to-a-sensitive-active-directory/ba-p/3436868
π₯ [ tweet ]
π₯1
π [ hackinarticles, Hacking Articles ]
IPV4 vs IPV6
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
π₯ [ tweet ]
IPV4 vs IPV6
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #cyberattacks #security #vulnerabilities
π₯ [ tweet ]
π [ ShitSecure, S3cur3Th1sSh1t ]
The last two weekends plus some evenings I spend my time writing a Nim Packer/Loader, which will be provided to Sponsors only via private repo. It's capable of packing C# Assemblies, Shellcode or PE-Files.
It's using my GetSyscallStub function to retrieve unhooked Syscalls from ntdll.dll to patch AMSI and/or ETW. The shellcode execution is also done via Syscalls from GetSyscallStub. This function will become public in Q1 2022.
The detection rate is at this time pretty good. One more reason for this repo to stay private. And theese binaries had no sandbox evasion checks, no sleep time and were not obfuscated via LLVM. I'll add sandbox evasion methods later on.
π https://www.patreon.com/S3cur3Th1sSh1t
π https://github.com/sponsors/S3cur3Th1sSh1t
π₯ [ tweet ]
The last two weekends plus some evenings I spend my time writing a Nim Packer/Loader, which will be provided to Sponsors only via private repo. It's capable of packing C# Assemblies, Shellcode or PE-Files.
It's using my GetSyscallStub function to retrieve unhooked Syscalls from ntdll.dll to patch AMSI and/or ETW. The shellcode execution is also done via Syscalls from GetSyscallStub. This function will become public in Q1 2022.
The detection rate is at this time pretty good. One more reason for this repo to stay private. And theese binaries had no sandbox evasion checks, no sleep time and were not obfuscated via LLVM. I'll add sandbox evasion methods later on.
π https://www.patreon.com/S3cur3Th1sSh1t
π https://github.com/sponsors/S3cur3Th1sSh1t
π₯ [ tweet ]
π1
π [ m3g9tr0n, Spiros Fraganastasis ]
An excellent article by @martinsohndk about Windows Shares post exploitation activities! You will be impressed with the amount of information which can be found by digging in shares https://t.co/LiriUP3xVE
π https://improsec.com/tech-blog/network-share-risks-deploying-secure-defaults-and-searching-shares-for-sensitive-information-credentials-pii-and-more
π₯ [ tweet ]
An excellent article by @martinsohndk about Windows Shares post exploitation activities! You will be impressed with the amount of information which can be found by digging in shares https://t.co/LiriUP3xVE
π https://improsec.com/tech-blog/network-share-risks-deploying-secure-defaults-and-searching-shares-for-sensitive-information-credentials-pii-and-more
π₯ [ tweet ]
π1
π [ fr0gger_, Thomas Roccia π€ ]
I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!
Which one are you using the most? π
#python #malware #cybersecurity #infosec
https://t.co/4q7N0ydQJa
π https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0
π₯ [ tweet ]
I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!
Which one are you using the most? π
#python #malware #cybersecurity #infosec
https://t.co/4q7N0ydQJa
π https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0
π₯ [ tweet ]
π [ ShitSecure, S3cur3Th1sSh1t ]
My DInvoke implementation in Nim is now also public:
https://t.co/4sNjTVsYfv
Feel free with testing and have fun! π»π
Challenge: who modifies the Nim compiler for DInvoke usage?π€
π https://github.com/S3cur3Th1sSh1t/Nim_DInvoke
π₯ [ tweet ]
My DInvoke implementation in Nim is now also public:
https://t.co/4sNjTVsYfv
Feel free with testing and have fun! π»π
Challenge: who modifies the Nim compiler for DInvoke usage?π€
π https://github.com/S3cur3Th1sSh1t/Nim_DInvoke
π₯ [ tweet ]
π₯2
π [ ntlmrelay, Ring3API ]
π Python utility to generate #MITRE ATT&CK Vault for #Obsidian.
1οΈβ£Get Obsidian (https://t.co/ZBOCQ2ez7U)
2οΈβ£Generate Vault (https://t.co/3A5dbhoRC2)
3οΈβ£Explore!
#blueteam #threathunting #ThreatIntelligence
π https://obsidian.md/
π https://github.com/arch4ngel/sec-vault-gen
π₯ [ tweet ]
π Python utility to generate #MITRE ATT&CK Vault for #Obsidian.
1οΈβ£Get Obsidian (https://t.co/ZBOCQ2ez7U)
2οΈβ£Generate Vault (https://t.co/3A5dbhoRC2)
3οΈβ£Explore!
#blueteam #threathunting #ThreatIntelligence
π https://obsidian.md/
π https://github.com/arch4ngel/sec-vault-gen
π₯ [ tweet ]
π2
π [ DebugPrivilege, β’ ]
Great blog post on hijacking Azure subscriptions. https://t.co/i2zQHrazu2
π https://derkvanderwoude.medium.com/azure-subscription-hijacking-and-cryptomining-86c2ac018983
π₯ [ tweet ]
Great blog post on hijacking Azure subscriptions. https://t.co/i2zQHrazu2
π https://derkvanderwoude.medium.com/azure-subscription-hijacking-and-cryptomining-86c2ac018983
π₯ [ tweet ]