| Tweetovi |
| Borja Merino proslijedio/la je tweet | ||
|
Casey Smith
@subTee
|
1. velj |
|
Load encrypted PE from XML Attribute.
MSBuild is still the best.😅
github.com/XwingAngel/PEL…
MSBuild sets Property then calls Execute.
Use this example to decouple payloads & prove that all security products have a "Single File Bias".
Decouple payloads to subvert detection. pic.twitter.com/648rujlLQn
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
spotless
@spotheplanet
|
26. sij |
|
Some study notes on LSASS hooking for harvesting interactive logon credentials.
ired.team/offensive-secu…
Thanks to @_xpn_ for his inspiring posts about mimikatz.
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
Adam
@Hexacorn
|
24. sij |
|
modexp is one of my fav. researchers; while I often skim on details he is killing it with posts that combine an extensive and comprehensive research on interesting and often nuanced topics and a very well written narrative
top quality right there
modexp.wordpress.com/2019/12/08/she…
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
Mumbai
@ilove2pwn_
|
22. sij |
|
ppldump : Injects MiniDumpWriteDump() Shellcode into PPL procs (lsass demo) to dump memory. Got better tools, so useless to me now. Note sometimes the threads lock after the APC is queued, causing MiniDumpWriteDump to fail. Just resume the thread(s) github.com/realoriginal/p… pic.twitter.com/49f7ewupKo
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
Luca Marcelli
@layle_ctf
|
17. sij |
|
My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!
blog.layle.io/uncovering-cve…
|
||
|
|
||
|
Borja Merino
@BorjaMerino
|
18. sij |
|
Windows kernel explorer: A free powerful Windows kernel research tool github.com/AxtMueller/Win…
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
Ghidra
@GHIDRA_RE
|
15. sij |
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
Matt Graeber
@mattifestation
|
14. sij |
|
No fancy EDR required to capture CVE-2020-0601 attempts (after patching). Just ensure you're forwarding Application log events. Currently, CVE-2020-0601 is the only Microsoft code (AFAIK) that calls the CveEventWrite API so event noise is not a concern. docs.microsoft.com/en-us/windows/… pic.twitter.com/JWPnaMaIqB
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
Josh Lospinoso
@jalospinoso
|
12. sij |
|
C++ for Hackers: How C++ can be a vital tool for infosec developers vimeo.com/384348826 @780thC @nostarch #cpp
|
||
|
|
||
|
Borja Merino
@BorjaMerino
|
11. sij |
|
Windows Process Injection in 2019 i.blackhat.com/USA-19/Thursda…. Nice compilation with functional examples.
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
ටل 🧗
@TheColonial
|
6. sij |
|
Dear #gobuster users, if you're a fan of the tool and are keen to throw a few dollarydoos at it, please head over here:
All proceeds received before the end of Jan (including the current balance of USD $271) will be donated to the Rural Fire Service here in Australia.
|
||
|
|
||
|
Borja Merino
@BorjaMerino
|
6. sij |
|
I'm highly curious about this :)
|
||
|
|
||
|
Borja Merino
@BorjaMerino
|
6. sij |
|
Thank you!!
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
Samy Kamkar
@samykamkar
|
5. sij |
|
I've developed a new technique for bypassing firewalls/NATs and producing full TCP/UDP session to targeted user. Anyone have RCE for a service that's typically only run behind NATs (eg desktop software like Sonos, Spotify, Dropbox, etc which bind to *) and want to merge projects?
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
Tim Yardley
@timyardley
|
5. sij |
|
One-Way Shellcode for firewall evasion using Out Of Band data shelliscoming.com/2019/03/one-wa…
|
||
|
|
||
|
Borja Merino
@BorjaMerino
|
6. sij |
|
bmerinofe @ gmail.com Thanks a lot!! I love this topic
|
||
|
|
||
|
Borja Merino
@BorjaMerino
|
6. sij |
|
Just tried with "simple" services, i.e. some C2 malware. It is true that with complex applications this approach (handle bruteforce) like findport/tag does not work well.
|
||
|
|
||
|
Borja Merino
@BorjaMerino
|
6. sij |
|
You mean while you go through all the handlers looking for the correct one?. What type of API did you experience problems with?
|
||
|
|
||
|
Borja Merino
@BorjaMerino
|
6. sij |
|
Hi Dave! This post is amazing (shared on muy blog), Yuange exploit is worthy of study!
|
||
|
|
||
| Borja Merino proslijedio/la je tweet | ||
|
Hacker Fantastic
@hackerfantastic
|
3. sij |
|
APT34 partial tools leak (repost as this got taken down very quickly) mega.nz/#!tdMGnIwb!NyT…
|
||
|
|
||