π [ VirtualAllocEx, Daniel Feichter ]
Although the Hell's Gate POC is a few years old, I was interested in understanding it in more detail.
So I wrote the new blog post "Exploring Hell's Gate" - an in-depth look at Hell's Gate.
π https://redops.at/en/blog/exploring-hells-gate
π₯ [ tweet ]
Although the Hell's Gate POC is a few years old, I was interested in understanding it in more detail.
So I wrote the new blog post "Exploring Hell's Gate" - an in-depth look at Hell's Gate.
π https://redops.at/en/blog/exploring-hells-gate
π₯ [ tweet ]
π1
π [ _RastaMouse, Rasta Mouse ]
[BLOG]
Short post showing how C# Source Generators could be used to build customisable implants.
π https://rastamouse.me/csharp-source-generators/
π₯ [ tweet ]
[BLOG]
Short post showing how C# Source Generators could be used to build customisable implants.
π https://rastamouse.me/csharp-source-generators/
π₯ [ tweet ]
π1
π [ D1rkMtr, D1rkMtr ]
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)
π https://github.com/TheD1rkMtr/TakeMyRDP
π₯ [ tweet ]
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)
π https://github.com/TheD1rkMtr/TakeMyRDP
π₯ [ tweet ]
π4
π [ HackAndDo, Pixis ]
Here we go, new articles are ready on a brand new and exciting topic, smart contracts security! βοΈ
β©To get things off to a good start, here's the first article, Blockchain 101.
Happy reading!
π https://en.hackndo.com/blockchain/
π₯ [ tweet ]
Here we go, new articles are ready on a brand new and exciting topic, smart contracts security! βοΈ
β©To get things off to a good start, here's the first article, Blockchain 101.
Happy reading!
π https://en.hackndo.com/blockchain/
π₯ [ tweet ]
Π½Π΅ ΡΠΈΠ»ΡΠ½ΠΎ ΡΠ²Π»Π΅ΠΊΠ°ΡΡΡ Π±Π»ΠΎΠΊΡΠ΅ΠΉΠ½Π°ΠΌΠΈ, Π½ΠΎ ΠΏΠΎΡΠΈΡΠ°ΡΡ ΠΌΠΎΠΆΠ½ΠΎ ΡΠ°Π· ΠΎΡ ΡΠ²ΠΠΆΠ°Π΅ΠΌΠΎΠ³ΠΎ Π°Π²ΡΠΎΡΠ°π₯4π2
π [ sensepost, Orange Cyberdefense's SensePost Team ]
Read how you can JOIN @steampipeio on @pdiscoveryio to get structured output in your reconnaissance / footprinting / bugbounty data in this experimental steampipe plugin by @leonjza!
Code here:
π https://sensepost.com/blog/2023/select-from-projectdiscovery-join-steampipe/
π https://github.com/sensepost/steampipe-plugin-projectdiscovery
π₯ [ tweet ]
Read how you can JOIN @steampipeio on @pdiscoveryio to get structured output in your reconnaissance / footprinting / bugbounty data in this experimental steampipe plugin by @leonjza!
Code here:
π https://sensepost.com/blog/2023/select-from-projectdiscovery-join-steampipe/
π https://github.com/sensepost/steampipe-plugin-projectdiscovery
π₯ [ tweet ]
π₯2π1
π [ Octoberfest73, Octoberfest7 ]
Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.
This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.
#redteam #Malware
π https://github.com/Octoberfest7/TeamsPhisher
π₯ [ tweet ]
Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.
This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.
#redteam #Malware
π https://github.com/Octoberfest7/TeamsPhisher
π₯ [ tweet ]
π₯3π1
π [ SEKTOR7net, SEKTOR7 Institute ]
A guide to building your engagement infrastructure, by AndrΓ© Tschapeller (@hipstertrojan)
#redteam
π https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/
π₯ [ tweet ]
A guide to building your engagement infrastructure, by AndrΓ© Tschapeller (@hipstertrojan)
#redteam
π https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/
π₯ [ tweet ]
π₯1
π [ rayanlecat, Rayan Bouyaiche ]
Hello everyone ! This weekend I participated to @_leHACK_ where i could do the CrackMapExec workshop of @mpgn_x64 . I did a little writeup if you're interested
π https://rayanlecat.ghost.io/write-up-workshop-cme-lehack-2023/
π₯ [ tweet ]
Hello everyone ! This weekend I participated to @_leHACK_ where i could do the CrackMapExec workshop of @mpgn_x64 . I did a little writeup if you're interested
π https://rayanlecat.ghost.io/write-up-workshop-cme-lehack-2023/
π₯ [ tweet ]
π₯6
π [ eversinc33, eversinc33 ]
I was tired of manually creating wordlists or having to rely on python for pre2k sprays, so did some small adjustments to @dafthack's DomainPasswordSpray to run pre2k password spraying on all computer objects of a domain.
π https://github.com/eversinc33/Invoke-Pre2kSpray
π₯ [ tweet ]
I was tired of manually creating wordlists or having to rely on python for pre2k sprays, so did some small adjustments to @dafthack's DomainPasswordSpray to run pre2k password spraying on all computer objects of a domain.
π https://github.com/eversinc33/Invoke-Pre2kSpray
π₯ [ tweet ]
π3
π [ EricaZelic, typedef struct _MALCOM { ]
Finally has some time to put the LDAP queries tweet in a blog post. Added some brief descriptions, how to enumerate nested group membership and members of Protected Users group.
π https://www.politoinc.com/post/ldap-queries-for-offensive-and-defensive-operations
π₯ [ tweet ]
Finally has some time to put the LDAP queries tweet in a blog post. Added some brief descriptions, how to enumerate nested group membership and members of Protected Users group.
π https://www.politoinc.com/post/ldap-queries-for-offensive-and-defensive-operations
π₯ [ tweet ]
π₯1
π [ cnotin, ClΓ©ment Notin ]
π "How to read Windows serialized certificates"
Sharing a code sample to read binary files in "%APPDATA%\Microsoft\SystemCertificates\My\Certificates", which are serialized certificates, using CryptQueryObject() (and more!)
π https://medium.com/tenable-techblog/code-for-reading-windows-serialized-certificates-8634d3487ec7
π₯ [ tweet ]
π "How to read Windows serialized certificates"
Sharing a code sample to read binary files in "%APPDATA%\Microsoft\SystemCertificates\My\Certificates", which are serialized certificates, using CryptQueryObject() (and more!)
π https://medium.com/tenable-techblog/code-for-reading-windows-serialized-certificates-8634d3487ec7
π₯ [ tweet ]
π₯1
π [ 0x6d69636b, Michael Schneider ]
My colleague @m8r1us has written an article about hardware keyloggers:
π https://www.scip.ch/en/?labs.20230706
π₯ [ tweet ]
My colleague @m8r1us has written an article about hardware keyloggers:
π https://www.scip.ch/en/?labs.20230706
π₯ [ tweet ]
π₯1
π [ vxunderground, vx-underground ]
The classic Russian "Hacker" magazine had some of the coolest artwork in the 90s
π₯ [ tweet ]
The classic Russian "Hacker" magazine had some of the coolest artwork in the 90s
π₯ [ tweet ]
trueπ₯10π1
π [ ShitSecure, S3cur3Th1sSh1t ]
After holding the talks at @x33fcon
and @WEareTROOPERS
done, I also finally managed to write down my latest research about userland hook evasion:
π https://s3cur3th1ssh1t.github.io/Cat_Mouse_or_Chess/
π₯ [ tweet ]
After holding the talks at @x33fcon
and @WEareTROOPERS
done, I also finally managed to write down my latest research about userland hook evasion:
π https://s3cur3th1ssh1t.github.io/Cat_Mouse_or_Chess/
π₯ [ tweet ]
π₯3