Wawa Security Links 331

Vendredi 29 Mars 2024


GoogleNCR / Twitter
Hacking tutos / Facebook


Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Hunting for LoLBins
oss-security - CVE-2019-2201: libjpeg-turbo: code execution
https://csrc.nist.gov/CSRC/media/Presentations/NIST-Status-Update-on-Elliptic-Curves-and-Post-Qua/images-media/moody-dustin-threshold-crypto-workshop-March-2019.pdf
Privilege Escalation | macOS Malware & The Path to Root Part 2 | SentinelOne | Autonomous AI Platform
NowSecure Discovers Critical Android Vuln That May Lead to Remote Code Execution - NowSecure
Tetrane - Automated Reverse Engineering Platform
https://blog.sucuri.net/2019/11/malicious-android-application-used-in-phishing-scam.html
The npm Blog — AppSec POV on Dependency Management
PSBits/README.md at master · gtworek/PSBits · GitHub
The case of DannyDinExec – CVE-2019-1440 « Insanely Low-Level
From arbitrary file overwrite to SYSTEM – Decoder's Blog
Where did System Services 0 and 1 go? – Pavel's Blog
Home · ticarpi/jwt_tool Wiki · GitHub
Exploiting Intel’s Management Engine – Part 2: Enabling Red JTAG Unlock on Intel ME 11.x (INTEL-SA-00086) | KaKaRoTo's Blog
Exploiting Intel’s Management Engine – Part 1: Understanding PT’s TXE PoC (INTEL-SA-00086) | KaKaRoTo's Blog
The Road to Qualcomm TrustZone Apps Fuzzing - Check Point Research
Introducing iVerify, the security toolkit for iPhone users | Trail of Bits Blog
phra's blog ~ Technical posts about InfoSec
GitHub - Mr-Un1k0d3r/SCShell: Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
https://www.exploit-db.com/exploits/47635

Don't Get Kicked Out! A Tale of Rootkits and Other Backdoors • Capsule8
Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Custom dropper hide and seek
https://posts.specterops.io/cve-2019-12757-local-privilege-escalation-in-symantec-endpoint-protection-1f7fd5c859c6
Bring Light To The Darkness
https://securitylab.github.com/research/bug-hunting-codeql-rsyslog
https://medium.com/c2defense/man-in-the-network-network-devices-are-endpoints-too-d5bd4a279e37
https://medium.com/bugbountywriteup/spoylleak-4ea0a8641561
Automating Pwn2Own with Jandroid
GitHub - Kkevsterrr/geneva: client-side censorship evasion engine from the Geneva AI
ZombieLoad Attack
GitHub - mzfr/rsh: generate reverse shell from CLI for linux and Windows.
Infectious Executable Stacks « null program
GitHub - andreafioraldi/frida-js-afl-instr: An example on how to do performant in-memory fuzzing with AFL++ and Frida
How to Exploit BlueKeep Vulnerability with Metasploit | Pentest-Tools.com Blog
Attention is All They Need: Combatting Social Media Information Operations With Neural Language Models | FireEye Inc
Office Macros, Evasion and Malicious Self-Reference
Some Useful AppSec Resources – Little Man In My Head
Hack The Box - Networked
Cracking passwords to prevent credential stuffing - Datto Engineering Blog
https://medium.com/sif0/hackthebox-networked-93ebbd6a70e3

https://medium.com/social_62682/heap-overflow-in-wolfssl-cve-2019-18840-185d233c27de
Symantec Endpoint Protection - Self-Defense Bypass and Potential Usages (CVE-2019-12758)
GitHub - apt69/COMahawk: Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322
Networked (HTB)
https://pagedout.institute/download/PagedOut_002_beta2.pdf
GitHub - bkerler/edl: QC Firehose / Sahara Client / QC Diag Tools :)
Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Language Interpreters - Google Präsentationen
Hack The Box - Networked | 0xRick
GitHub - nccgroup/sadcloud: A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure
Hack The Box: Networked – Khaotic Developments
Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction – LimitedResults
https://isc.sans.edu/forums/diary/Some packetfu with Zeek previously known as bro/25510/
ATT&CK T1501: Understanding Systemd Service Persistence
TALOS-2019-0886 || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence
GitHub - kevoreilly/CAPEv2
GitHub - peterbjornx/me_sa86_exploit: Exploit generator for Intel ME 11 buffer overflow
Detection in the Dark - reddit.pdf - Google Drive
GitHub - 0xeb-bp/bluekeep: Public work for CVE-2019-0708
Arbitrary Command execution in Privacy Disclaimer page of a very popular organization – Pankaj Upadhyay
GitHub - liamg/pax: CLI tool for PKCS7 padding oracle attacks

https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort
https://www.intel.com/content/dam/support/us/en/documents/processors/mitigations-jump-conditional-code-erratum.pdf
Writing userspace USB drivers for abandoned devices
My First SSRF Using DNS Rebinding | MAREK.GELETA
new phineas fisher zine!!! - Google Docs
https://blog.sucuri.net/2019/11/malware-rabbit-hole-part-2.html
Intezer - ACBackdoor: Analysis of a New Multiplatform Backdoor
Update: tcp-honeypot.py Version 0.0.7 | Didier Stevens
Error
Writing a simple deobfuscator for a simple C# malware variant
Subdomain_recon.py: A SubDomain Reconnaissance Tool
Cloud Network Security 101: AWS VPC Endpoints
Exposed Log and Configuration Files - Ghostlulz Hacks
Tyranid's Lair: The Internals of AppLocker - Part 2 - Blocking Process Creation
GitHub - bkth/optimize_rce_chakra: keynote I gave at GreHack 2019
How safe is Apple’s Safe Browsing? – A Few Thoughts on Cryptographic Engineering
https://github.com/j00ru/ctf-tasks/tree/master/Dragon CTF 2019/Main event/BabyKernel
Protocol Properties & Attack Vectors – Insinuator.net
Rainy Day Windows Command Research Results - Black Hills Information Security
https://isc.sans.edu/forums/diary/SMS and 2FA Another Reason to Move away from It/25526/


Translate / Map
Wikipedia [ENG] / GIT

Metasploit / ExploitDB
Converter / Project 0

Hotmail / Gmail / ODA
eprint.iacr / Youtube