Filtres

Résultats :

Bug Bounty Hunting

Bug bounty hunting platform

https://www.bugbountyhunting.com/

#BugBounty

HackerOne

Bug bounty platform

https://hackerone.com/

#BugBounty

Resources for Beginner Bug Bounty Hunters

GitHub repository with resources for beginners

https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters

#BugBounty

Bugcrowd

Bug bounty platform

https://bugcrowd.com/programs

#BugBounty

BB-legal-FR

French bug bounty legal resources

https://github.com/noraj/BB-legal-FR

#BugBounty

Zapstiko

Bug bounty articles and resources

https://www.zapstiko.com/category/hacking-articles/bug-bounty-hacking-articles/

#BugBounty

Udemy Course

Advanced guide to finding good bugs

https://www.udemy.com/course/bug-bounty-an-advanced-guide-to-finding-good-bugs/

#BugBounty

Twitter Thread

Bug bounty tips and resources

https://twitter.com/therceman/status/1536774501211553793?t=ARu5YSqtCSOb5JNLypCqIA&s=19

#BugBounty

Huntr

Bug bounty platform

https://huntr.dev/

#BugBounty

Advance subdomain recon using subfinder , httpx , waybackurls

Bug bounty tutorial

https://www.youtube.com/watch?v=9mSLSC7aUcY

#Cloud

PowerShell Escape

PowerShell escape sequences

https://www.rlmueller.net/PowerShellEscape.htm

#BugBounty

BugBountyBooks

GitHub repository with bug bounty e-books

https://github.com/akr3ch/BugBountyBooks

#BugBounty

BugBountyScanner

GitHub repository with bug bounty scanner

https://github.com/chvancooten/BugBountyScanner

#BugBounty

Hide and Sec

Bug bounty cheat sheet

https://hideandsec.sh/books/cheatsheets-82c/page/bug-bounty

#BugBounty

Awesome Google VRP Writeups

GitHub repository with Google VRP write-ups

https://github.com/xdavidhu/awesome-google-vrp-writeups

#BugBounty

In Bug Hunters

Getting started in bug bounty

https://medium.com/inbughunters/getting-started-in-bug-bounty-7052da28445a

#BugBounty

The Bug Hunter's Methodology v4.0

Bug bounty tutorial

https://www.youtube.com/watch?v=p4JgIu1mceI

#BugBounty

TBHM

GitHub repository with bug bounty resources

https://github.com/jhaddix/tbhm

#BugBounty

InitigritiFetcher

GitHub repository with bug bounty fetcher

https://github.com/Gomez0015/InitigritiFetcher

#BugBounty

Galer

GitHub repository with bug bounty resources

https://github.com/dwisiswant0/galer

#BugBounty

Awesome Bugbounty Writeups

GitHub repository with bug bounty write-ups

https://github.com/devanshbatham/Awesome-Bugbounty-Writeups

#BugBounty

Zenrows

Bypassing Cloudflare

https://www.zenrows.com/blog/bypass-cloudflare

#BugBounty

PSBDMP

PSBDMP database

https://psbdmp.ws/

#BugBounty

Google Drive

Bug bounty resources

https://drive.google.com/file/d/1wMGITzEtpt_PgDug37NpmihORv4dcxeJ/view

#BugBounty

Bounty Targets Data

GitHub repository with bug bounty targets data

https://github.com/arkadiyt/bounty-targets-data

#BugBounty

Publically Disclosed Bug Bounty POCs by Hackers

Bug bounty tutorials and resources

https://m.youtube.com/@bugbountypocs/featured

#Cloud

Infosec Writeups

Bypassing Google's fix to access their internal admin panels

https://infosecwriteups.com/bypassing-googles-fix-to-access-their-internal-admin-panels-12acd3d821e3

#BugBounty

GitHub Gist

Bug bounty resources

https://gist.github.com/Frycos/62fa664bacd19a85235be19c6e4d7599

#BugBounty

Security Affairs

Facebook and Instagram bug

https://securityaffairs.com/141571/social-networks/facebook-instagram-bug.html?amp=1

#BugBounty

Public Bug Bounty Programs

GitHub repository with public bug bounty programs

https://github.com/projectdiscovery/public-bugbounty-programs

#BugBounty

Twitter Thread

Bug bounty tips and resources

https://twitter.com/hacker_/status/1512552850831851531

#BugBounty

Twitter Thread

Bug bounty tips and resources

https://twitter.com/albinowax/status/925743148600647680

#BugBounty

Twitter Thread

Bug bounty tips and resources

https://twitter.com/d0nutptr/status/1110501209528373248

#BugBounty

Google Dorks

Bug bounty Google dorks

https://taksec.github.io/google-dorks-bug-bounty/

#BugBounty

Nuclei Templates

Nuclei templates for bug bounty

https://templates.nuclei.sh/templates

#BugBounty

BugBounty

GitHub repository with bug bounty resources

https://github.com/00xtrace/BugBounty

#BugBounty

Mind Maps

GitHub repository with mind maps for bug bounty

https://github.com/imran-parray/Mind-Maps

#BugBounty

Yes We Hack

Getting started with smart contract bug bounty

https://blog.yeswehack.com/yeswerhackers/getting-started-smart-contract-bug-bounty/

#BugBounty

Hacky'Nov 0x02 | Introduction au Bug Bounty

Bug bounty tutorial

https://www.youtube.com/watch?v=mifj2NVGjKY

#Cloud

Bug Bounty Cheatsheet

GitHub repository with bug bounty cheat sheet

https://github.com/EdOverflow/bugbounty-cheatsheet

#BugBounty

Keyhacks

GitHub repository with keyhacks

https://github.com/streaak/keyhacks

#BugBounty

Jon Bottarini

Bug bounty articles and resources

https://www.jonbottarini.com/tag/bug-bounty/

#BugBounty

Netspi Blog

Automating Managed Identity Token Extraction in Azure Container Registries

https://www.netspi.com/blog/technical/cloud-penetration-testing/automating-managed-identity-token-extraction-in-azure-container-registries/

#Cloud

WEareTROOPERS

Infosec Exchange

https://infosec.exchange/@WEareTROOPERS

#Cloud

MSOLSpray

MSOLSpray GitHub Repository

https://github.com/dafthack/MSOLSpray

#Cloud

Privilege Escalation via Storage Accounts

Blog post by Rogier Dijkman

https://rogierdijkman.medium.com/privilege-escalation-via-storage-accounts-bca24373cc2e

#Cloud

Thunder CTF

Thunder CTF GitHub Repository

https://github.com/NicholasSpringer/thunder-ctf

#Cloud

Rhinosecuritylabs

Privilege Escalation Google Cloud Platform Part 1

https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/

#Cloud

PrtToCert

PrtToCert GitHub Repository

https://github.com/morRubin/PrtToCert

#Cloud

Dirkjanm

Obtaining Domain Admin from Azure AD via Cloud Kerberos Trust

https://dirkjanm.io/obtaining-domain-admin-from-azure-ad-via-cloud-kerberos-trust/

#Cloud

Dirkjanm

Digging Further into the Primary Refresh Token

https://dirkjanm.io/digging-further-into-the-primary-refresh-token/

#Cloud

M365 Maps

M365 Maps Website

https://m365maps.com/

#Cloud

365-Stealer

365-Stealer GitHub Repository

https://github.com/AlteredSecurity/365-Stealer

#Cloud

DaemonSet in Kubernetes

YouTube Video

https://www.youtube.com/embed/yYeUic8B6fM

#Cloud

Msportals

Azure IT Admin Portals

https://msportals.io/#azure-it-admin-portals

#Cloud

Wikipedia

French Wikipedia

https://fr.wikipedia.org/

#Cloud

WeirdAAL

WeirdAAL GitHub Repository

https://github.com/carnal0wnage/weirdAAL

#Cloud

SANS Offensive Operations

YouTube Channel

https://www.youtube.com/channel/UCP28F4uf9s2V1_SQwnJST_A

#Cloud

Mike Felch and Beau Bullock

YouTube Video

https://www.youtube.com/watch?v=KTVHLolz6cE

#Cloud

SANS

SANS Workshop Building Azure Pentest Lab Red Teams

https://www.sans.org/webcasts/sans-workshop-building-azure-pentest-lab-red-teams/?msc=OOLP

#Cloud

Awesome Azure Pentest

Awesome Azure Pentest GitHub Repository

https://github.com/Kyuu-Ji/Awesome-Azure-Pentest

#Cloud

Rhinosecuritylabs

Privilege Escalation Google Cloud Platform Part 2

https://rhinosecuritylabs.com/cloud-security/privilege-escalation-google-cloud-platform-part-2/

#Cloud

Aws Consoler

Aws Consoler GitHub Repository

https://github.com/NetSPI/aws_consoler

#Cloud

NCC Group

Post-Exploiting a Compromised etcd: Full Control over the Cluster and its Nodes

https://research.nccgroup.com/2023/11/07/post-exploiting-a-compromised-etcd-full-control-over-the-cluster-and-its-nodes/

#Cloud

PushSecurity

Phishing Microsoft Teams for Initial Access

https://pushsecurity.com/blog/phishing-microsoft-teams-for-initial-access/

#Cloud

CloudVulnDB

CloudVulnDB Website

https://www.cloudvulndb.org/

#Cloud

ScoutSuite

ScoutSuite GitHub Repository

https://github.com/nccgroup/ScoutSuite

#Cloud

John Savill's Technical Training

YouTube Channel

https://www.youtube.com/@NTFAQGuy/videos

#Cloud

Netspi

Netspi Author Karl Fosaaen

https://www.netspi.com/author/karl-fosaaen/

#Cloud

MDSEC

Microsoft Office Online Server Remote Code Execution

https://www.mdsec.co.uk/2022/10/microsoft-office-online-server-remote-code-execution/

#Cloud

Google

Google Search Engine

https://google.com/

#Cloud

HackTheBox

AWS Pentesting Guide

https://www.hackthebox.com/blog/aws-pentesting-guide

#Cloud

Google Cloud Hacking Red Team Perspective!

YouTube Video

https://www.youtube.com/watch?v=SqfDFIQ8kkk

#Cloud

Azure Attack & Defense

YouTube Playlist

https://www.youtube.com/playlist?list=PL__YARLYIdeRDP-KsLIOqnzjc69MvmDde

#Cloud

GCPGoat

GCPGoat GitHub Repository

https://github.com/ine-labs/GCPGoat

#Cloud

Msportals

Msportals Website

https://msportals.io/

#Cloud

AWSGoat

AWSGoat GitHub Repository

https://github.com/ine-labs/AWSGoat

#Cloud

DEF CON 29 - Matthew Bryant - Hacking G Suite

YouTube Video

https://youtu.be/6AsVUS79gLw

#Cloud

MAAD-AF

MAAD-AF GitHub Repository

https://github.com/vectra-ai-research/MAAD-AF

#Cloud

JH Live

JH Live Halborn

https://jh.live/halborn

#Cloud

So You Think You Can Secure Your Cloud

YouTube Video

https://youtu.be/AwXswDg-rKc

#Cloud

CloudVulnDB

CloudVulnDB Website

https://www.cloudvulndb.org

#Cloud

Hausec

AzureHound Cypher Cheatsheet

https://hausec.com/2020/11/23/azurehound-cypher-cheatsheet/

#Cloud

John Hammond

YouTube Channel

https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw

#Cloud

Synacktiv

Azure AD Introduction for Red Teamers

https://www.synacktiv.com/publications/azure-ad-introduction-for-red-teamers.html

#Cloud

ShadowClone

ShadowClone GitHub Repository

https://github.com/fyoorer/ShadowClone

#Cloud

Twitter

Twitter Profile

https://twitter.com/emiliensocchi

#Cloud

Srinath Challa

YouTube Channel

https://www.youtube.com/channel/UCpDWgD1lX0IJHeMd-GLyKOg

#Cloud

ClIam

ClIam GitHub Repository

https://github.com/securisec/cliam/tree/master

#Cloud

AWS

AWS CLI

https://aws.amazon.com/cli/

#Cloud

Azure App Tools

Azure App Tools GitHub Repository

https://github.com/rvrsh3ll/Azure-App-Tools

#Cloud

XPN Security

Azure AD Connect for Red Teamers

https://blog.xpnsec.com/azuread-connect-for-redteam/

#Cloud

Altered Security

365 Stealer Introduction

https://www.alteredsecurity.com/post/introduction-to-365-stealer

#Cloud

How to Build a Cloud Hacking Lab

YouTube Video

https://www.youtube.com/watch?v=4s_3oNwqImo

#Cloud

CloudSecurityPartners

Hack AWS in 60 Minutes GitHub Repository

https://github.com/CloudSecurityPartners/hack-aws-in-60-minutes

#Cloud

BsidesOrl Youtube

YouTube Channel

https://www.youtube.com/channel/UC6avYrvlXYAKHCBdxjj9L0w

#Cloud

NCC Group

NCC Group Research Author NCC Manning

https://research.nccgroup.com/author/nccmanning/

#Cloud

TrustedSec

Hacking Your Cloud Tokens Edition 2.0

https://www.trustedsec.com/blog/hacking-your-cloud-tokens-edition-2-0/

#Cloud

Azure Red Team

Azure Red Team GitHub Repository

https://github.com/rootsecdev/Azure-Red-Team

#Cloud

TROOPERS IT Security Conference

YouTube Channel

https://www.youtube.com/channel/UCPY5aUREHmbDO4PtR6AYLfQ

#Cloud

MFASweep

MFASweep GitHub Repository

https://github.com/dafthack/MFASweep

#Cloud

Sofblocks

Azure Attack Paths

https://sofblocks.github.io/azure-attack-paths/

#Cloud

Google Cloud 4 Words

Google Cloud 4 Words GitHub Repository

https://github.com/priyankavergadia/google-cloud-4-words

#Cloud

Twitter

Twitter Profile

https://twitter.com/_wald0

#Cloud

Checkov

Checkov GitHub Repository

https://github.com/bridgecrewio/checkov

#Cloud

BadOption

MobilePhish Blog Post

https://badoption.eu/blog/2024/01/08/mobilephish.html

#Cloud

NCC Group

Command and Kubectl Talk Follow-up

https://research.nccgroup.com/2020/02/12/command-and-kubectl-talk-follow-up/

#Cloud

Tracebit

Finding AWS Account ID of Any S3 Bucket

https://tracebit.com/blog/2024/02/finding-aws-account-id-of-any-s3-bucket/

#Cloud

Hacking The Cloud

Hacking The Cloud Website

https://hackingthe.cloud

#Cloud

Fireprox

Fireprox GitHub Repository

https://github.com/ustayready/fireprox

#Cloud

Black Hills InfoSec

GraphRunner

https://www.blackhillsinfosec.com/introducing-graphrunner/

#Cloud

Rhinosecuritylabs

Persistent AWS Access with Role Chain Juggling

https://rhinosecuritylabs.com/aws/cloud-container-attack-tool/

#Cloud

Carlospolop

BF My GCP Permissions GitHub Repository

https://github.com/carlospolop/bf_my_gcp_permissions

#Cloud

Synacktiv

Mindmaps GitHub Repository

https://github.com/synacktiv/Mindmaps

#Cloud

CMEPW

Azure Mindmap GitHub Repository

https://github.com/CMEPW/azure-mindmap

#Cloud

CloudSecWiki

CloudSecWiki Website

https://cloudsecwiki.com

#Cloud

Tripla

Certified Azure Red Team Professional CARTP Exam Review

https://tripla.dk/2021/12/29/certified-azure-red-team-professional-cartp-by-pentester-academy-exam-review/

#Cloud

Instagram

Nahamsec Instagram Profile

https://instagram.com/nahamsec

#Cloud

Twitch

Nahamsec Twitch Channel

https://twitch.tv/nahamsec

#Cloud

Red Team Operations

PRTAbuse from Userland with Cobalt Strike

https://red.0xbad53c.com/red-team-operations/azure-and-o365/prt-abuse-from-userland-with-cobalt-strike/

#Cloud

CloudRecon

CloudRecon GitHub Repository

https://github.com/g0ldencybersec/CloudRecon

#Cloud

Finding Secrets in Publicly Exposed Ebs Volumes

YouTube Video

https://www.youtube.com/watch?v=HXM1rBk_wXs

#Cloud

Cobalt.io

Azure AD Pentesting Fundamentals

https://www.cobalt.io/blog/azure-ad-pentesting-fundamentals

#Cloud

Find Privilege Escalation Paths in Microsoft Azure with AzureHound

YouTube Video

https://www.youtube.com/embed/m33VeLRUi4w

#Cloud

Packt Publishing

Penetration Testing Azure for Ethical Hackers GitHub Repository

https://github.com/PacktPublishing/Penetration-Testing-Azure-for-Ethical-Hackers

#Cloud

O365 Blog

O365 Blog Website

https://o365blog.com/

#Cloud

DigitalOcean

DigitalOcean Community Post

https://m.do.co/c/3236319b9d0b

#Cloud

Lutzenfried

OffensiveCloud GitHub Repository

https://github.com/lutzenfried/OffensiveCloud

#Cloud

Cody D Martin

GCP Cloud Function Abuse Blog Post

https://blog.codydmartin.com/gcp-cloud-function-abuse/

#Cloud

Dirkjanm

Abusing Azure AD SSO with the Primary Refresh Token

https://dirkjanm.io/abusing-azure-ad-sso-with-the-primary-refresh

#Cloud

Appetize.io - Online Emulator

Run native mobile apps in your browser using Appetize.io, an online emulator for Android and iOS.

https://appetize.io/

#Mobile

Incinerator - Boschko

Explore Boschko's Incinerator, a powerful tool for analyzing and reversing Android applications.

https://boschko.ca/incinerator/amp/

#Mobile

Twemoji - Thumbs Up

Thumbs Up emoji from the Twemoji project by Twitter.

https://cdn.jsdelivr.net/gh/twitter/twemoji@latest/assets/svg/1f44c.sv

#Mobile

Twemoji - Fire

Fire emoji from the Twemoji project by Twitter.

https://cdn.jsdelivr.net/gh/twitter/twemoji@latest/assets/svg/1f525.sv

#Mobile

Codeshare - Frida

Codeshare for Frida, a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.

https://codeshare.frida.

#Mobile

Auditer la sécurité d'une application iOS avec Needle

Un guide pour auditer la sécurité des applications iOS en utilisant Needle.

https://connect.ed-diamond.com/MISC/misc-091/auditer-la-securite-d-une-application-ios-avec-needle

#Mobile

Un EDR sous Android

Article détaillant la mise en place d'un EDR (Endpoint Detection and Response) sous Android.

https://connect.ed-diamond.com/misc/misc-116/un-edr-sous-android

#Mobile

Discord Channel

Join the discussion on this specific Discord channel.

https://discord.com/channels/819985942407675945/819988038289588244/1032019602877714473

#Mobile

APKLab - APK Analyzer

APKLab is an integrated solution for Android applications reverse engineering.

https://github.com/APKLab/APKLab

#Mobile

Blabb - MarketStreetCyber

Blabb is a tool for security assessments and analysis by MarketStreetCyber.

https://github.com/MarketStreetCyber/Blabb

#Mobile

Blabber - MarketStreetCyber

Blabber is another security tool developed by MarketStreetCyber.

https://github.com/MarketStreetCyber/Blabber

#Mobile

Mobile Security Framework (MobSF)

An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis, and security assessment framework.

https://github.com/MobSF/Mobile-Security-Framework-MobSF

#Mobile

Remote Buffer Overflow in Android 11

A detailed analysis of a remote buffer overflow vulnerability in the wifi_stack of Android 11 platform on Samsung A20e.

https://github.com/SpiralBL0CK/Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20e

#Mobile

Android Logs, Events, and Protobuf Parser (ALEAPP)

ALEAPP parses various logs, events, and Protobufs from Android devices.

https://github.com/abrignoni/ALEAPP

#Mobile

iLEAPP - iOS Logs, Events, and Protobuf Parser

iLEAPP is a tool to parse iOS logs, events, and Protobuf data.

https://github.com/abrignoni/iLEAPP

#Mobile

Apple Cloud Notes Parser

A parser for Apple Cloud Notes, extracting and presenting data from iCloud backups.

https://github.com/threeplanetssoftware/apple_cloud_notes_parser

#Mobile

PhoneSploit - Exploitation Framework

PhoneSploit is a framework that utilizes ADB to exploit Android devices.

https://github.com/aerosol-can/PhoneSploit

#Mobile

Frida Snippets

A collection of useful Frida scripts for reverse engineering and instrumentation.

https://github.com/iddoeldor/frida-snippets

#Mobile

Mobile Hacking Cheat Sheet

A comprehensive cheat sheet for mobile hacking and penetration testing.

https://github.com/randorisec/MobileHackingCheatSheet

#Mobile

FriList - Friends List Manager

FriList is a tool for managing friends lists on social media platforms.

https://github.com/rsenet/FriList

#Mobile

APKFram - APK Analysis Framework

APKFram is a framework for the analysis and reverse engineering of APK files.

https://github.com/rsenet/apkfram.git

#Mobile

Objection - Runtime Mobile Exploration

Objection is a runtime mobile exploration toolkit powered by Frida, designed for performing security assessments of mobile applications.

https://github.com/sensepost/objection

#Mobile

Apple BLEEE

Research on Apple's Bluetooth Low Energy Exposé (BLEEE) vulnerabilities.

https://hexway.io/research/apple-bleee/

#Mobile

Android Pentest Lab Guide

A step-by-step guide on building an Android penetration testing lab.

https://medium.com/purplebox/step-by-step-guide-to-building-an-android-pentest-lab-853b4af6945e

#Mobile

SSL Pinning Bypass Guide

The ultimate guide to bypassing SSL pinning, provided by RedHunt Labs.

https://redhuntlabs.com/wp-content/uploads/2021/10/Ultimate-Guide-to-SSL-Pinning-Bypass-RedHunt-Labs-Attack-Surface-Management.pdf

#Mobile

Extracting Android Backup Files

How to extract or unpack an .ab file (Android backup file) from your device.

https://stackoverflow.com/questions/18533567/how-to-extract-or-unpack-an-ab-file-android-backup-file

#Mobile

Aacle on Twitter

Follow Aacle on Twitter for updates and insights.

https://twitter.com/Aacle_

#Mobile

Aacle Twitter Status

Check out this specific tweet from Aacle on Twitter.

https://twitter.com/Aacle_/status/1584916071483858944?s=20&t=_NVI4Fohd_VrJfcOymSCKg

#Mobile

Intro to Mobile Pentesting

An introduction to mobile penetration testing by Hack The Box.

https://www.hackthebox.com/blog/intro-to-mobile-pentesting

#Mobile

Setting Up Mobexler

Guide on setting up Mobexler with VMware and Android Studio.

https://www.randorisec.fr/setting-up-mobexler-vmware-android-studio/

#Mobile

XDA Developers

XDA Developers is a community of developers and enthusiasts focused on Android development.

https://www.xda-developers.com/

#Mobile

Svetius on XDA Developers

Profile of Svetius, a contributor on XDA Developers.

https://www.xda-developers.com/author/svetius

#Mobile

YouTube Channel - Mobile Security

Subscribe to this YouTube channel for videos on mobile security.

https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQ

#Mobile

Intercepting Android App Traffic with BurpSuite

Watch this video on mobile security from YouTube.

https://www.youtube.com/watch?v=xp8ufidc514

#Mobile

Zero Day Hacker Author

Author page on Zero Day Hacker, featuring various articles on mobile security.

https://zerodayhacker.com/author/hjdbvet6z3k

#Mobile

Using an Android Emulator for API Hacking

Learn how to use an Android emulator for API hacking on Zero Day Hacker.

https://zerodayhacker.com/using-an-android-emulator-for-api-hacking/

#Mobile

Les bases du chiffrement RSA | Episode #1 [RSA Series] by express

Introduction to RSA cryptography by express.

https://www.youtube.com/watch?v=RyMmKoSSPN8

#Crypto

Express - YouTube

Express channel for cryptography tutorials and explanations.

https://www.youtube.com/channel/UCFMT8Cx0JO8BRkiZ8vzIa1A

#Crypto

Cryptographie : chiffrement RSA - YouTube

Tutorial on RSA encryption in French language.

https://www.youtube.com/watch?v=KfUrZG6Vo2Q

#Crypto

Tech AB Info - YouTube

Tech AB Info channel with various tech and crypto-related content.

https://www.youtube.com/channel/UCkzVomnoR_X9uE5box2Dw8g

#Crypto

An Introduction to the Arithmetic of Elliptic Curves - YouTube

Educational series on elliptic curves in cryptography.

https://www.youtube.com/playlist?list=PLYpVTXjEi1oe1OeAllJpNhFoI4B7Ws8Yl

#Crypto

Quantum - YouTube

Quantum channel featuring videos on quantum cryptography.

https://www.youtube.com/channel/UCgeO7CtfYSdWt0PPZ3vafqw

#Crypto

Post-quantum cryptography: Supersingular isogenies for beginners

Introduction to supersingular isogenies for post-quantum cryptography.

https://www.youtube.com/watch?v=9B7jq7Mgiwc

#Crypto

Microsoft Research - YouTube

Videos from Microsoft Research covering various aspects of cryptography.

https://www.youtube.com/channel/UCCb9_Kn8F_Opb3UCGm-lILQ

#Crypto

The Mathematics of Lattices I

Lecture on the mathematics of lattices in cryptography.

https://youtu.be/LlPXfy6bKIY

#Crypto

Simons Institute - YouTube

Videos from Simons Institute discussing advanced topics in cryptography.

https://www.youtube.com/channel/UCW1C2xOfXsIzPgjXyuhkw9g

#Crypto

Conférence @BlackRaven - Intro au RSA

Conference introducing RSA cryptography in French.

https://www.youtube.com/watch?v=FiZwf8GfSzo

#Crypto

Joue à la crypto ! (french)

Crypto challenges and tutorials in French language.

https://www.youtube.com/watch?v=iIesDpv9F4s

#Crypto

Ange Albertini - YouTube

Videos from Ange Albertini covering various crypto-related topics.

https://www.youtube.com/channel/UCwQvHQ2JdGomedDJFJ9r7DA

#Crypto

[MPSI/PCSI/MP2I] Continuité - 2 exos de khôlle corrigés

Mathematics exercises related to cryptography.

https://www.youtube.com/watch?v=IdchTH9bGOs

#Crypto

Téo VS la prépa

Videos on preparing for cryptography challenges and exams.

https://www.youtube.com/channel/UCn4MPWKkXuS2GlmLH9-Qaew

#Crypto

[TECH] Contrôler un ordi à distance : SSH & Diffie Hellman

Tech tutorial on SSH and Diffie-Hellman key exchange.

https://youtu.be/VXGt12Nioqc

#Crypto

Pour 1nf0 - la Cyber expliquée

Explanation of cybersecurity concepts in French.

https://www.youtube.com/channel/UCHScE3Ck5G6_Cp0BqPM7YTA

#Crypto

AES Explained (Advanced Encryption Standard) - Computerphile

Explanation of the AES encryption algorithm.

https://www.youtube.com/watch?v=O4xNJsjtN6E

#Crypto

Computerphile - YouTube

Computerphile channel with videos on computer science topics including cryptography.

https://www.youtube.com/channel/UC9-y-6csu5WGm29I7JiwpnA

#Crypto

How can you attack an ECB cipher? [Capture The Flag Fundamentals]

Explanation of attacking ECB mode encryption.

https://www.youtube.com/watch?v=unn09JYIjOI

#Crypto

247CTF - YouTube

247CTF channel featuring CTF challenges including cryptography.

https://www.youtube.com/channel/UCtGLeKomT06x3xZ2SZp2l9Q

#Crypto

All-Army CyberStakes! AES-ECB Plaintext Recovery

Demonstration of AES-ECB plaintext recovery in a cyber competition.

https://www.youtube.com/watch?v=f-iz_ZAS258

#Crypto

John Hammond - YouTube

John Hammond channel with tutorials on cybersecurity and cryptography.

https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw

#Crypto

No title found

No description available.

https://www.youtube.com/channel/UCEpTctnbaz_m9DpibqG1siw

#Crypto

Python to decrypt RSA / ChaCha20 ransomware - encryptor [Flare-On 2022]

Demonstration of decrypting RSA and ChaCha20 ransomware.

https://www.youtube.com/watch?v=S9NyJD4LiY0

#Crypto

0xdf - YouTube

0xdf channel featuring cybersecurity and crypto-related content.

https://www.youtube.com/channel/UChO9OAH57Flz35RRX__E25A

#Crypto

Chacha Cipher - Computerphile

Explanation of the ChaCha stream cipher.

https://youtu.be/UeIpq-C-GSA

#Crypto

Deep Dive into Parsing SSH Keys To Exploit Improperly Sanitized Screenshots

Tutorial on exploiting SSH key parsing vulnerabilities.

https://youtu.be/4F1XGsvB2iA

#Crypto

IppSec - YouTube

IppSec channel featuring cybersecurity walkthroughs including cryptographic challenges.

https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA

#Crypto

How We Created the First SHA-1 Collision and What it Means for Hash Security

Explanation of creating the first SHA-1 collision and its implications for hash security.

https://www.youtube.com/watch?v=Zl1TZJGfvPo

#Crypto

Black Hat - YouTube

Black Hat channel featuring presentations on cybersecurity including cryptography.

https://www.youtube.com/channel/UCJ6q9Ie29ajGqKApbLqfBOg

#Crypto

Introduction to LEA Cryptography

Introduction to the LEA cryptographic algorithm.

https://maojui.me/Crypto/LEA/

#Crypto

Elliptic Curve Cryptography (ECC) - Nakov Cryptobook

Explanation of elliptic curve cryptography from the Nakov Cryptobook.

https://cryptobook.nakov.com/asymmetric-key-ciphers/elliptic-curve-cryptography-ecc

#Crypto

Introduction to RSA - SigmaPrime Blog

Introduction to RSA encryption from SigmaPrime Blog.

https://blog.sigmaprime.io/introduction-to-rsa.html

#Crypto

Attacking RSA for Fun and CTF Points (Part 1)

Exploration of attacking RSA for fun and in Capture The Flag competitions (Part 1).

https://bitsdeep.com/posts/attacking-rsa-for-fun-and-ctf-points-part-1/

#Crypto

JA3 Fingerprints

Explanation and usage of JA3 fingerprints in cybersecurity.

https://ja3er.com/

#Crypto

Impersonating JA3 Fingerprints

Techniques for impersonating JA3 fingerprints in cybersecurity.

https://medium.com/cu-cyber/impersonating-ja3-fingerprints-b9f555880e42

#Crypto

Beyond the Hash: How Unsupervised Machine Learning Unlocks the True Power of JA-3

Exploration of unsupervised machine learning and JA-3 in cybersecurity.

https://www.darktrace.com/en/blog/beyond-the-hash-how-unsupervised-machine-learning-unlocks-the-true-power-of-ja-3/

#Crypto

RSA CTF Tool

Tool for conducting RSA-related Capture The Flag challenges.

https://github.com/Ganapati/RsaCtfTool

#Crypto

Bit Flipping Attack on CBC Mode

Explanation and demonstration of bit flipping attacks on CBC mode encryption.

https://crypto.stackexchange.com/questions/66085/bit-flipping-attack-on-cbc-mode

#Crypto

Cryptography and Engineering - Infosec Reference

Reference material on cryptography and engineering.

https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/CandE.md

#Crypto

Introduction to RSA

Introduction to RSA encryption.

https://medium.com/@c0D3M/introduction-to-rsa-e8cb39af508e

#Crypto

CryptoHack Courses

Courses and challenges for learning cryptography.

https://cryptohack.org/courses/

#Crypto

Elliptic Curves Mathematics - Alpertron

Mathematical exploration of elliptic curves in cryptography.

https://www.alpertron.com.ar/ECM.HTM

#Crypto

Basic Notions in Number Theory

Basic notions in number theory related to cryptography.

https://github.com/zademn/EverythingCrypto/blob/master/E1%20Mathematics/Number_theory/Basic_notions.ipynb

#Crypto

Rolling Your Own Crypto: AES

Guide to rolling your own AES encryption implementation.

https://github.com/francisrstokes/githublog/blob/main/2022/6/15/rolling-your-own-crypto-aes.md

#Crypto

Real-World Cryptography

Book covering real-world applications of cryptography.

https://www.amazon.fr/Real-world-Cryptography-David-Wong/dp/1617296716

#Crypto

Crypto: The Handbook

Handbook covering various aspects of cryptography.

https://b-ok.cc/book/17217306/389dcb

#Crypto

JSur

Website or resource related to cryptography.

https://jsur.in/

#Crypto

W3Challs Crypto Challenges

Challenges and exercises related to cryptography.

https://w3challs.com/challenges/list/crypto

#Crypto

Crypto Attacks Repository

Repository of crypto attacks and techniques.

https://github.com/jvdsn/crypto-attacks

#Crypto

RSA Cryptography

Overview of RSA cryptography.

https://vozec.fr/crypto-rsa/

#Crypto

Advanced Military Cryptography

Book on advanced military cryptography.

https://www.amazon.com/Advanced-Military-Cryptography-Cryptographic-Friedman/dp/0894120115

#Crypto

Cryptography Wiki

Wiki resource on cryptography.

https://cryptography.fandom.com/wiki/Crypto_Wiki

#Crypto

Elliptic Curves README

README file on elliptic curves.

https://github.com/ashutosh1206/Crypton/blob/master/Elliptic-Curves/README.md

#Crypto

ChaCha20 Design

Design principles of the ChaCha20 cipher.

https://loup-vaillant.fr/tutorials/chacha20-design

#Crypto

ChaCha20 Key Derivation

Key derivation in ChaCha20 stream cipher.

https://loup-vaillant.fr/articles/chacha20-key-derivation

#Crypto

ChaCha20 Stream Ciphers

Usage of ChaCha20 in stream ciphers.

https://libsodium.gitbook.io/doc/advanced/stream_ciphers/chacha20

#Crypto

AES Square Attack

Attack techniques against AES using square attack.

https://github.com/thomasperrot/aes-square-attack

#Crypto

Cryptologie

Resource or information related to cryptography.

https://www.cryptologie.net/

#Crypto

Movs Like Jagger CA CTF 2022 Crypto Writeup

Writeup of crypto challenge from CA CTF 2022.

https://www.hackthebox.com/blog/movs-like-jagger-ca-ctf-2022-crypto-writeup

#Crypto

Side Channel Attacks Writeup

Writeup on side channel attacks in cryptography.

https://github.com/0x14mth3n1ght/Writeup/tree/master/FCSC/side_chan/

#Crypto

AES Encryption Algorithm Explained

Explanation of the AES encryption algorithm.

https://braincoke.fr/blog/2020/08/the-aes-encryption-algorithm-explained/

#Crypto

Video-Based Cryptanalysis

Cryptanalysis methods using video content.

https://www.nassiben.com/video-based-crypta

#Crypto

Introduction to Lattice Cryptography

Introduction to lattice-based cryptography.

https://vozec.fr/crypto-lattice/lattice-introduction/

#Crypto

ECDSA - Handle with Care

Best practices and handling tips for ECDSA cryptography.

https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/

#Crypto

FCSC 2020 Writeup: Corrumpere

Writeup for the FCSC 2020 challenge "Corrumpere".

https://github.com/Jakobus0/FCSC-2020-write-ups/blob/master/corrumpere_write_up.md

#Crypto

AES Flipper

Tool or technique involving AES encryption.

https://github.com/Vozec/AES-Flipper

#Crypto

PHP mt_rand Prediction

Prediction and analysis of PHP mt_rand function.

https://www.ambionics.io/blog/php-mt-rand-prediction

#Crypto

mt_rand Reverse Engineering

Reverse engineering of the mt_rand function.

https://github.com/ambionics/mt_rand-reverse

#Crypto

Creating the First SHA-1 Collision

Explanation of creating the first SHA-1 collision.

https://www.youtube.com/watch?v=Zl1TZJGfvPo

#Crypto

BinVis

Visualize binary files in interesting ways.

https://binvis.io/#/

#Forensics

EWF Tools

Working with Expert Witness Files in Linux.

https://dfir.science/2017/11/EWF-Tools-working-with-Expert-Witness-Files-in-Linux.html

#Forensics

BMC Tools

Various tools by ANSSI-FR for BIOS Management.

https://github.com/ANSSI-FR/bmc-tools

#Forensics

PCRT

Password Cracking Resource Tools.

https://github.com/sherlly/PCRT

#Forensics

CTF Forensics

Forensics challenges and resources for CTF.

https://trailofbits.github.io/ctf/forensics/

#Forensics

LaZagne Forensic

Tool to retrieve passwords stored on a system.

https://github.com/AlessandroZ/LaZagneForensic

#Forensics

Forensics Spreadsheet

A comprehensive forensics spreadsheet.

https://docs.google.com/spreadsheets/d/1z-44BUA2AVf8uqnoiDDSi7UxbyWy8KJqK4uaYq_0YYg/edit#gid=9

#Forensics

iOS Forensics

HFS file system, partitions, and relevant evidences.

https://www.andreafortuna.org/2020/08/31/ios-forensics-hfs-file-system-partitions-and-relevant-evidences/

#Forensics

iLEAPP

iOS Logs, Events, and Properties Parser.

https://github.com/abrignoni/iLEAPP

#Forensics

iOS Forensics Institute

Resources on iOS forensics.

https://resources.infosecinstitute.com/topic/ios-forensics/

#Forensics

BP Lister

Parse and extract data from BPL files.

https://github.com/threeplanetssoftware/bplister

#Forensics

Frequent Locations Dumper

Dump iOS Frequent Locations data.

https://github.com/mac4n6/iOS-Frequent-Locations-Dumper

#Forensics

Chainbreaker

Decrypt iOS iTunes Backup Keychain.

https://github.com/n0fate/chainbreaker

#Forensics

Forensics Tools

Various forensics tools by Mesquidar.

https://github.com/mesquidar/ForensicsTools

#Forensics

Digital Forensics

Digital forensics resources and tools.

https://www.digitalforensics.com/

#Forensics

DEDA

Data Exfiltration Detection Algorithm.

https://github.com/dfd-tud/deda

#Forensics

Firmadyne

Emulation framework for firmware analysis.

https://github.com/firmadyne/firmadyne/

#Forensics

Conti Ransomware

How I cracked Conti Ransomware Group’s leaked source code.

https://medium.com/@whickey000/how-i-cracked-conti-ransomware-groups-leaked-source-code-zip-file-e15d54663a8

#Forensics

Basic Linux Memory Forensics

Video on Linux memory forensics.

https://www.youtube.com/watch?v=uYWTfWV3dQI&ab_channel=IppSec

#Forensics

VolWeb

Web interface for Volatility.

https://github.com/k1nd0ne/VolWeb

#Forensics

OS Forensics

Complete forensic suite by PassMark Software.

https://www.osforensics.com/

#Forensics

Android Memory Forensics

Memory forensics on Android devices.

https://www.pwc.be/en/FY21/documents/Android_memory_forensics.pdf

#Forensics

Vol-GUI

Graphical user interface for Volatility.

https://github.com/AdityaSec/Vol-GUI

#Forensics

Cobalt Strike Investigation

Part 1 of the Cobalt Strike Investigation series.

https://blog.lexfora.com/Cobalt%20Strike%20Investigation%20Part%201.html

#Forensics

Unhide-NG

Detect hidden processes on Unix-like systems.

https://github.com/YJesus/Unhide-NG

#Forensics

DNSCat Decoder

Decoder for DNSCat protocol.

https://github.com/MicksMix/DNSCatDecoder

#Forensics

Volatility Cheatsheet

Cheatsheet for Volatility framework.

https://k-lfa.info/volatility-cheatsheet/

#Forensics

DNS Implants Detection

Case study on detecting DNS implants.

https://research.nccgroup.com/2022/08/11/detecting-dns-implants-old-kitten-new-tricks-a-saitama-case-study/

#Forensics

Forensics Tools List

List of useful forensics tools.

https://k-lfa.info/quelques-tools-forensics/

#Forensics

DumpZilla

Extract information from Firefox and Thunderbird profiles.

https://github.com/Busindre/dumpzilla

#Forensics

Firefox Decrypt

Decrypt passwords from Firefox.

https://github.com/Unode/firefox_decrypt

#Forensics

Cobalt Strike Attack Analysis

Analyze attacks using Cobalt Strike.

https://connect.ed-diamond.com/misc/misc-116/analyser-une-attaque-utilisant-l-outil-d-intrusion-commercial-cobalt-strike

#Forensics

Chainsaw

Command-line tool for forensics and incident response.

https://github.com/WithSecureLabs/chainsaw

#Forensics

Plaso

Framework for timeline creation.

https://github.com/log2timeline/plaso

#Forensics

MACB Times

Understanding MACB times in Windows Forensic Analysis.

https://andreafortuna.org/2017/10/06/macb-times-in-windows-forensic-analysis/

#Forensics

Recovering Browser History

Recover cleared browser history.

https://www.inversecos.com/2022/10/recovering-cleared-browser-history.html?m=1

#Forensics

MacOS HFS Forensics

Investigation numérique sous macOS HFS.

https://connect.ed-diamond.com/MISC/misc-107/investigation-numerique-sous-macos-hfs

#Forensics

Chainbreaker

Decrypt iOS iTunes Backup Keychain.

https://github.com/n0fate/chainbreaker

#Forensics

EWF Info

Command-line tool to show information about EWF files.

https://command-not-found.com/ewfinfo

#Forensics

EWF Mount

Mount EWF files as a file system.

https://command-not-found.com/ewfmount

#Forensics

Cobalt Strike Scan

Scan for Cobalt Strike beacons.

https://github.com/Apr4h/CobaltStrikeScan

#Forensics

Apple Binary Property List

Understanding Apple’s binary property list format.

https://medium.com/@karaiskc/understanding-apples-binary-property-list-format-281e6da00dbd

#Forensics

CTF Writeup

Writeup for a CTF forensic challenge.

https://ctftime.org/writeup/23198

#Forensics

CTF Writeups

Writeups for FCSC 2021 forensics challenges.

https://github.com/SorCelien/CTF-WRITEUPS/blob/main/FCSC-2021/forensics/ordiphone-2.md

#Forensics

EZDump Writeups

Writeups for SharkyCTF EZDump challenges.

https://www.synacktiv.com/publications/sharkyctf-ezdump-writeups-linux-forensics-introduction.html

#Forensics

Kallsyms Extractor

Extract kallsyms from Linux kernel memory dumps.

https://github.com/pagabuc/kallsyms-extractor

#Forensics

ACM Digital Library

Research paper on forensics.

https://dl.acm.org/doi/fullHtml/10.1145/3485471

#Forensics

Volatility Slides

Slides on Volatility from LSE Summer Week 2016.

https://www.lse.epita.fr/lse-summer-week-2016/slides/lse-summer-week-2016-04-volatility.pdf

#Forensics

Dwarf2JSON

Convert DWARF debugging information to JSON.

https://github.com/volatilityfoundation/dwarf2json

#Forensics

Volatility Profile Creation

Create specific Volatility profile and symbol table.

https://fahriguresci.com/create-specific-volatility-profile-and-symbol-table/

#Forensics

EVTX

Library to work with Windows EVTX event log files.

https://github.com/omerbenamram/evtx

#Forensics

Search Windows EVTX Files

Search Windows EVTX files with precision.

https://bhabeshraj.com/post/search-windows-evtx-files-with-precision/

#Forensics

ExFinder

Forensics tool to find and extract data.

https://github.com/d4rk-d4nph3/exfinder

#Forensics

Windows Event Logs Forensics

Forensic analysis of Windows event logs.

https://andreafortuna.org/2017/10/20/windows-event-logs-in-forensic-analysis/

#Forensics

Chainbreaker

Decrypt iOS iTunes Backup Keychain.

https://github.com/AppLeU0/chainbreaker

#Forensics

Cracking Android PINs

Cracking PIN and password locks on Android.

https://forensics.spreitzenbarth.de/2012/02/28/cracking-pin-and-password-locks-on-android/

#Forensics

Breaking Android Screenlock

Breaking the screenlock on Android devices.

https://forensics.spreitzenbarth.de/2015/08/12/breaking-the-screenlock-a-short-update/

#Forensics

Malware on Memory Dumps

Finding malware on memory dumps using Volatility and YARA rules.

https://andreafortuna.org/2018/07/16/finding-malware-on-memory-dumps-using-volatility-and-yara-rules/

#Forensics

Libzpy

Library for analyzing zip files.

https://github.com/mak/libzpy

#Forensics

UNBUP

Tool to extract files from .bup archives.

https://github.com/OpenSecurityResearch/unbup

#Forensics

ZeusScan

Volatility plugin for scanning Zeus malware.

https://github.com/botherder/volatility/blob/master/contrib/plugins/malware/zeusscan.py

#Forensics

Mimikatz

Post-exploitation tool to extract credentials.

https://github.com/FreeRDP/FreeRDP/wiki/Mimikatz

#Forensics

RDP Replay

Replay RDP sessions.

https://github.com/ctxis/RDP-Replay

#Forensics

Decrypt Stub Data

Decrypt encrypted stub data in Wireshark.

https://medium.com/tenable-techblog/decrypt-encrypted-stub-data-in-wireshark-deb132c076e7

#Forensics

Inverse COS

Research and tools for digital forensics.

https://www.inversecos.com/

#Forensics

LaZagne Forensic

Tool to retrieve passwords stored on a system.

https://github.com/AlessandroZ/LaZagneForensic

#Forensics

SANS Diary

Diary entry on digital forensics.

https://isc.sans.edu/diary/rss/27968

#Forensics

RDP Replay Archive

Archive of RDP replay blog post.

https://web.archive.org/web/20200424034135/https://www.contextis.com/en/blog/rdp-replay

#Forensics

Decrypting IPsec Protocols

Decrypting IPsec protocols ISAKMP.

https://celaldogan2010.medium.com/decrypting-ipsec-protocols-isakmp-and-5a93991

#Forensics

RDP Network Forensics

Writeup on RDP network forensics.

https://res260.medium.com/ihack-2020-monster-inc-the-middle-rdp-network-forensics-writeup-91e2fb0f4287

#Forensics

PyRDP

Python RDP man-in-the-middle and library.

https://github.com/GoSecure/pyrdp

#Forensics

HTB Writeup

Memory forensics writeup on HackTheBox.

https://www.hackthebox.com/blog/memory-forensics-volatility-write-up

#Forensics

LiME on Android

LiME on Android AVDs for Volatility analysis.

https://gabrio-tognozzi.medium.com/lime-on-android-avds-for-volatility-analysis-a3d2d89a9dd0

#Forensics

Speakeasy

Emulation framework for Windows malware.

https://github.com/mandiant/speakeasy

#Forensics

MemProcFS

Memory Process File System.

https://github.com/ufrisk/MemProcFS

#Forensics

Eric Zimmerman Tools

Digital forensics tools by Eric Zimmerman.

https://ericzimmerman.github.io/#!index.md

#Forensics

Volatility Illustrated

Illustrated guide to memory forensics with Volatility.

https://volatility-labs.blogspot.com/2021/10/memory-forensics-r-illustrated.html

#Forensics

WSL Memory Forensics

Memory forensics and the Windows Subsystem for Linux.

https://dfrws.org/wp-content/uploads/2019/06/paper_memory_forensics_and_the_windows_subsystem_for_linux.pdf

#Forensics

FACT Core

Firmware Analysis and Comparison Tool.

https://github.com/fkie-cad/FACT_core

#Forensics

EMBA

Embedded malware binary analysis.

https://github.com/e-m-b-a/emba

#Forensics

HFSleuth

Tool for analyzing HFS file systems.

https://newosxbook.com/tools/hfsleuth.html

#Forensics

Acropalypse

Recover partially overwritten PNG files.

https://acropalypse.app/

#Forensics

Hindsight

Analyze web browser artifacts.

https://github.com/obsidianforensics/hindsight

#Forensics

Memory Forensics Video

Introduction to memory forensics video playlist.

https://www.dfir.training/video-playlists/introduction-to-memory-forensics

#Forensics

Revoke-Obfuscation

PowerShell obfuscation detection framework.

https://github.com/danielbohannon/Revoke-Obfuscation

#Forensics

CanaryToken Scanner

Scan for CanaryTokens in files.

https://github.com/0xNslabs/CanaryTokenScanner

#Forensics

HTB Anti-Forensics

Anti-forensics techniques on HackTheBox.

https://www.hackthebox.com/blog/anti-forensics-techniques

#Forensics

DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks

Presentation at DEF CON 24 discussing methods to bypass captive portals and limited networks.

https://www.youtube.com/watch?v=GhUUzGBjhXQ

#Network

Gerald Doussot - State of DNS Rebinding Attacks & Singularity of Origins

Discussion on the current state of DNS rebinding attacks and their origins.

https://www.youtube.com/watch?v=y9-0lICNjOQ

#Network

Sécurisez votre infrastructure mail avec DNS - Bastien Sécher

Conference on securing mail infrastructure using DNS.

https://www.youtube.com/watch?v=C2gy_vITxLA

#Network

Modbus Traffic Analysis | SANS ICS Concepts

Analysis of Modbus traffic focusing on SANS ICS concepts.

https://www.youtube.com/watch?v=OAsLdXzKQo8

#Network

La 5G expliquée avec des petites voitures

Educational video explaining 5G technology using small cars.

https://www.youtube.com/watch?v=ao3jzvDghNI

#Network

Comprehensive Guide to pfSense 2.3 Part 1: The What and Why

Detailed guide to pfSense 2.3 covering its features and benefits.

https://www.youtube.com/watch?v=agieD5uiwYY

#Network

Attacking Real VoIP System with SIPVicious OSS

Article discussing attacks on real VoIP systems using SIPVicious OSS.

https://www.rtcsec.com/article/attacking-real-voip-system-with-sipvicious-oss/

#Network

Beyond the Hash: How Unsupervised Machine Learning Unlocks the True Power of JA3

Exploration of unsupervised machine learning and its impact on JA3 technology.

https://www.darktrace.com/en/blog/beyond-the-hash-how-unsupervised-machine-learning-unlocks-the-true-power-of-ja-3/

#Network

JA3er

Website focusing on JA3 fingerprinting techniques and tools.

https://ja3er.com/

#Network

Impersonating JA3 Fingerprints

Medium article detailing methods for impersonating JA3 fingerprints.

https://medium.com/cu-cyber/impersonating-ja3-fingerprints-b9f555880e42

#Network

Pinterest - Anderson Boschi

Pinterest board related to cybersecurity and technology.

https://www.pinterest.com/anderson_boschi/

#Network

SNMPv3Brute

GitHub repository for SNMPv3Brute tool.

https://github.com/applied-risk/snmpv3brute

#Network

SIPCrack

Tool for cracking SIP authentication.

https://www.kali.org/tools/sipcrack/

#Network

Password Cracker Cookbooks

Recipes and techniques for password cracking.

https://www.ifm.net.nz/cookbooks/passwordcracker.html

#Network

IEEE 802.11 WiFi Security Hacking

Medium article discussing WiFi security hacking in IEEE 802.11 networks.

https://medium.com/@syedhuseyn/ieee-802-11-wifi-security-hacking-149d26a2831

#Network

Meet WiFiDemon: iOS WiFi RCE 0-Day Vulnerability

Research article on the WiFiDemon iOS WiFi RCE 0-day vulnerability.

https://blog.zecops.com/research/meet-wifidemon-ios-wifi-rce-0-day-vulnerability-and-a-zero-click-vulnerability-that-was-silently-patched/

#Network

Palo Alto Warns of Zero-Day Bug in

Alert from Palo Alto Networks regarding a zero-day vulnerability.

https://thehackernews.com/2021/11/palo-alto-warns-of-zero-day-bug-in.html?m=1

#Network

Linux Packet Captures with tcpdump

Guide on performing Linux packet captures using tcpdump.

https://cordero.me/linux-packet-captures-with-tcpdump/

#Network

Author KCordero

Author profile page for KCordero.

https://cordero.me/author/kcordero/

#Network

VLAN Hopping Attack

Blog post detailing VLAN hopping attacks.

https://papehane.blogspot.com/2018/01/vlan-hopping-attack.html

#Network

DNSSEC: What is it? Why Important?

ICANN resource page explaining DNSSEC and its importance.

https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-20-fr

#Network

WiFi Hacking MindMap v1

Mind map for WiFi hacking techniques.

https://github.com/koutto/pi-pwnbox-rogueap/blob/main/mindmap/WiFi-Hacking-MindMap-v1.png

#Network

Exploiting AWS: Attackers Perspective

Insights into exploiting AWS vulnerabilities from an attacker's perspective.

https://daycyberwox.com/exploiting-aws-2-attackers-perspective-flaws2cloud

#Network

Twitter - FlashbackPwn

Twitter post from FlashbackPwn.

https://twitter.com/FlashbackPwn

#Network

Hack Protocol Chapter RIPV1

LinkedIn post on hacking protocol chapter RIPV1 by Mike Ghahremani.

https://www.linkedin.com/pulse/hack-protocol-chapter-ripv1-mike-ghahremani/

#Network

Abusing MS Teams Direct Routing

Blog post on abusing Microsoft Teams Direct Routing.

https://blog.syss.com/posts/abusing-ms-teams-direct-routing/

#Network

Decrypt Encrypted Stub Data in Wireshark

Tenable TechBlog article on decrypting encrypted stub data in Wireshark.

https://medium.com/tenable-techblog/decrypt-encrypted-stub-data-in-wireshark-deb132c076e7

#Network

Fluxion

GitHub repository for Fluxion tool.

https://github.com/FluxionNetwork/fluxion

#Network

Analyzing WhatsApp Calls

Medium article analyzing WhatsApp calls.

https://medium.com/@schirrmacher/analyzing-whatsapp-calls-176a9e776213

#Network

WebMap

GitHub repository for WebMap tool.

https://github.com/SabyasachiRana/WebMap

#Network

Twitter - 0xor0ne

Twitter post from 0xor0ne.

https://twitter.com/0xor0ne

#Network

Mama Always Told Me Not to Trust

Blog post from Grimm detailing trust issues.

https://blog.grimm-co.com/2021/09/mama-always-told-me-not-to-trust.html

#Network

Subdomain Enumeration with DNSSEC

Blog post on subdomain enumeration using DNSSEC.

https://www.securesystems.de/blog/subdomain-enumeration-with-DNSSEC/

#Network

Kismet Wireless

Official website of Kismet Wireless tool.

https://www.kismetwireless.net/

#Network

VLAN Hopping

Blog post on VLAN hopping.

https://bwlryq.net/posts/vlan_hopping/

#Network

SeeYouCM Thief

GitHub repository for SeeYouCM Thief tool.

https://github.com/trustedsec/SeeYouCM-Thief

#Network

Unauthenticated Dumping of Usernames via Cisco Unified Call Manager (CUCM)

Blog post on unauthenticated dumping of usernames via Cisco Unified Call Manager.

https://www.n00py.io/2022/01/unauthenticated-dumping-of-usernames-via-cisco-unified-call-manager-cucm/

#Network

Dissecting Exploiting TCP IP RCE Vulnerability

Security Intelligence article dissecting and exploiting TCP/IP RCE vulnerability.

https://securityintelligence.com/posts/dissecting-exploiting-tcp-ip-rce-vulnerability-evilesp/

#Network

PacketTotal

Website for analyzing packet captures.

https://packettotal.com/

#Network

Twitter - Cyb Detective

Twitter post from Cyb Detective.

https://twitter.com/cyb_detective

#Network

Deep Dive into TLS

Medium article diving deep into TLS protocol.

https://medium.com/devops-dudes/deep-dive-into-tls-a9798ac1763a

#Network

Bettercap

Official website of Bettercap tool.

https://www.bettercap.org/

#Network

Nord-Stream

GitHub repository for Nord-Stream tool.

https://github.com/synacktiv/nord-stream

#Network

Yersinia

GitHub repository for Yersinia tool.

https://github.com/tomac/yersinia

#Network

VoIP Hopper

Website for VoIP Hopper tool.

https://voiphopper.sourceforge.net/

#Network

OSPFMD5Crack

GitHub repository for OSPFMD5Crack tool.

https://github.com/c4s73r/OSPFMD5Crack/tree/main

#Network

Comprendre les attaques via ARP Spoofing MITM DoS

French article explaining ARP spoofing, MITM, and DoS attacks.

https://www.it-connect.fr/comprendre-les-attaques-via-arp-spoofing-mitm-dos/

#Network

arpspoof

GitHub repository for arpspoof tool.

https://github.com/byt3bl33d3r/arpspoof

#Network

Wireless Pentesting CheatSheet

GitHub repository for Wireless Pentesting CheatSheet.

https://github.com/V0lk3n/WirelessPentesting-CheatSheet

#Network

Network Segmentation Cheat Sheet

GitHub repository for Network Segmentation Cheat Sheet.

https://github.com/sergiomarotco/Network-segmentation-cheat-sheet

#Network

A Quick Look at QUIC

APNIC blog post providing an overview of QUIC protocol.

https://blog.apnic.net/2019/03/04/a-quick-look-at-quic/

#Network

dns2tcp

GitHub repository for dns2tcp tool.

https://github.com/alex-sector/dns2tcp

#Network

Docker Packet Filtering Firewalls

Docker documentation on packet filtering firewalls.

https://docs.docker.com/network/packet-filtering-firewalls/

#Network

Online SMS PDU Decoder

Tool for decoding online SMS PDU.

https://www.smsdeliverer.com/online-sms-pdu-decoder.aspx

#Network

NMEA Analyser

Tool for analyzing NMEA data.

https://swairlearn.bluecover.pt/nmea_analyser

#Network

OneShot-C

GitHub repository for OneShot-C tool.

https://github.com/nikita-yfh/OneShot-C

#Network

DNS Course

NSLookup.io course on DNS fundamentals.

https://www.nslookup.io/dns-course/

#Network

Investigating Surfshark and NordVPN with JA4T

Medium article investigating Surfshark and NordVPN using JA4T.

https://medium.com/foxio/investigating-surfshark-and-nordvpn-with-ja4t-7bbf5a33aad0

#Network

Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwir...

Exploring the implications of hotwiring electric vehicles in 2023.

https://www.youtube.com/watch?v=5tLNRk7mZXo

#Hardware

Don't Buy a "Gaming Chair" - Office Chair vs. Gaming Chair Round-Up...

Comparison between office chairs and gaming chairs.

https://www.youtube.com/watch?v=9Yhc6mmdJC4

#Hardware

Gamers Nexus

Channel focusing on gaming hardware and technology reviews.

https://youtube.com/c/GamersNexus

#Hardware

Can You Recover Sound From Images?

Investigating the possibility of recovering sound from images.

https://www.youtube.com/watch?v=eUzB0L0mSCI

#Hardware

Deus Ex Silicium

Videos on technology and electronics.

https://www.youtube.com/user/dexsilicium/videos

#Hardware

SO YOU HACKED A WIFI ROUTER, AND NOW WHAT ?

Exploring post-exploitation scenarios after hacking a WiFi router.

https://www.youtube.com/watch?v=bbZvIXU4laI

#Hardware

Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec Cal...

Samy Kamkar discussing radio hacking of cars and hardware.

https://www.youtube.com/watch?v=1RipwqJG50c

#Hardware

How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own

Discussion on hacking a TP-Link router at Pwn2Own competition.

https://www.youtube.com/watch?v=zjafMP7EgEA

#Hardware

Kiosk BREAKOUT - Web Browser to Command Prompt (Easy Mode)

Demonstration of breaking out of kiosks using web browsers.

https://www.youtube.com/watch?v=R7srpHUshuI

#Hardware

Sécurité iot et systèmes embarqués - Analyse de Firmware

Security analysis of IoT and embedded systems firmware.

https://www.youtube.com/watch?v=9ONXskRt_qQ

#Hardware

PWNING A NETGEAR ROUTER FROM WAN MITM STYLE

Man-in-the-middle style attack on a Netgear router from WAN.

https://www.youtube.com/watch?v=NQrKFeS5YUk

#Hardware

Deus Ex Silicium : Boîtiers EcoOBD & NitroOBD - ATTENTION ARNAQUE !

Discussion on EcoOBD & NitroOBD scam.

https://www.youtube.com/watch?v=fGciVNYHw7U

#Hardware

Clés de véhicules, prix excessifs ou justifiés ?

Analysis of the pricing of vehicle keys.

https://www.youtube.com/watch?v=IBJUh0jr9P0

#Hardware

BlackAlps17: Hydrabus: Lowering the entry fee to the IoT bugfest by...

Lowering the entry fee to IoT bugfest with Hydrabus.

https://www.youtube.com/watch?v=theYbzPhYH8

#Hardware

Jayson E. Street: Keynote [Security Fest 2022]

Keynote speech by Jayson E. Street at Security Fest 2022.

https://www.youtube.com/watch?v=FP5c8_U1G-w

#Hardware

DEF CON 30 - stacksmashing - The Hitchhacker’s Guide to iPhone Lig...

Hitchhacker’s guide to iPhone lightning cable hacking at DEF CON 30.

https://www.youtube.com/watch?v=8p3Oi4DL0eI

#Hardware

4 Gadgets bannis que n'importe qui peut acheter

Discussion on banned gadgets that anyone can buy.

https://www.youtube.com/watch?v=rTmJOkmlzro

#Hardware

Deus Ex Silicium : Analyse du démontage de la PS5 par Sony

Analysis of the PS5 disassembly by Sony.

https://www.youtube.com/watch?v=9ZmKyjpq9jo

#Hardware

retrofixer

Channel focusing on retro electronics and repairs.

https://www.youtube.com/@retrofixer

#Hardware

Flashback Team

Videos from the Flashback Team on various tech topics.

https://youtube.com/c/FlashbackTeam

#Hardware

Ce que nous révèle la puce de silicium d'un permis de conduire

Analysis of silicon chip in a driver's license.

https://www.youtube.com/watch?v=aTpH34Mvg90

#Hardware

Hacker's Guide to UART Root Shells

Guide to UART root shell attacks.

https://www.youtube.com/watch?v=01mw0oTHwxg

#Hardware

SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables

Air-gap exfiltration attack via radio signals from SATA cables.

https://www.youtube.com/watch?v=rlmP-csuFIo

#Hardware

Tom's Hardware France

Site web spécialisé dans les actualités et tests de matériel informatique.

https://tomshardware.fr/

#Hardware

Beapi - Tom's Hardware France

Auteur Beapi sur Tom's Hardware France.

https://www.tomshardware.fr/author/beapi/

#Hardware

NooElec NESDR SMArt - Aluminium & antennes

Produit NooElec NESDR SMArt avec aluminium et antennes.

https://www.amazon.fr/NooElec-NESDR-SMArt-Aluminium-antennes/dp/B01GDN1T4S/

#Hardware

Wireless Collinear Antenna Calculator

Calculateur d'antenne collinéaire sans fil.

https://martybugs.net/wireless/collinear.cgi

#Hardware

BattleChip - CTF 0xff.re 2021

Défi BattleChip du CTF FCSC 2021 sur 0xff.re.

https://ctf.0xff.re/2021/fcsc_2021/battlechip

#Hardware

Writeups - FCSC 2021 Hardware

Writeups pour le CTF FCSC 2021 sur le thème du hardware.

https://github.com/dspiricate/writeups/tree/main/FCSC/2021/hardware

#Hardware

J2000.0 - Wikipedia

Article sur J2000.0 sur Wikipedia.

https://fr.wikipedia.org/wiki/J2000.0

#Hardware

Saleae Support

Ressources de support de Saleae.

https://support.saleae.com/

#Hardware

Tweet - Podalirius

Tweet de Podalirius.

https://twitter.com/podalirius_/status/1434887791536652290

#Hardware

Tweet - Podalirius

Tweet de Podalirius.

https://twitter.com/podalirius_/status/1436420758188838913

#Hardware

RF to Bytes - RTL-SDR

Projet RF to Bytes avec RTL-SDR sur nada-labs.net.

https://nada-labs.net/2017/rf-to-bytes-rtl-sdr/

#Hardware

Nada Labs - Auteur Nada

Auteur Nada sur nada-labs.net.

https://nada-labs.net/author/nada/

#Hardware

Entête Ethernet - FrameIP

Article sur l'entête Ethernet sur FrameIP.

https://www.frameip.com/entete-ethernet/

#Hardware

Sebastien Fontaine - FrameIP

Auteur Sebastien Fontaine sur FrameIP.

https://www.frameip.com/author/sebastien-fontaine/

#Hardware

Universal Radio Hacker (URH) - GitHub

Universal Radio Hacker (URH) sur GitHub.

https://github.com/jopohl/urh

#Hardware

DUMPhfDL - GitHub

DUMPhfDL sur GitHub.

https://github.com/szpajder/dumphfdl

#Hardware

Firmwalker - GitHub

Firmwalker sur GitHub.

https://github.com/craigz28/firmwalker

#Hardware

Firmware Modification Kit - GitHub

Firmware Modification Kit sur GitHub.

https://github.com/rampageX/firmware-mod-kit

#Hardware

Awesome-Hardware-and-IoT-Hacking - GitHub

Awesome-Hardware-and-IoT-Hacking sur GitHub.

https://github.com/CyberSecurityUP/Awesome-Hardware-and-IoT-Hacking

#Hardware

Infrared - Flipper Zero Blog

Article sur l'infrarouge sur le blog de Flipper Zero.

https://blog.flipperzero.one/infrared/amp/

#Hardware

DIY: How to Create Your Own 4G Proxy - BlackHatWorld

Guide DIY pour créer son propre proxy 4G sur BlackHatWorld.

https://www.blackhatworld.com/seo/diy-how-to-create-your-own-4g-proxy.1234185/

#Hardware

Classroom - Flipper Zero Blog

Articles de la catégorie Classroom sur le blog de Flipper Zero.

https://blog.flipperzero.one/tag/classroom/

#Hardware

How I Hacked My Car - Programming With Style

Article sur le piratage de voiture sur Programming With Style.

https://programmingwithstyle.com/posts/howihackedmycar/

#Hardware

Learning Asynchronous Serial - Saleae

Guide d'apprentissage sur les communications série asynchrones sur Saleae.

https://support.saleae.com/tutorials/learning-portal/learning-resources/learn-asynchronous-serial

#Hardware

Flipper Zero Firmware with Plugins - GitHub

Firmware Flipper Zero avec plugins sur GitHub.

https://github.com/RogueMaster/flipperzero-firmware-wPlugins

#Hardware

Gadgets How-To - HackMag

Articles How-To sur les gadgets sur HackMag.

https://hackmag.com/security/gadgets-howto/

#Hardware

Drakylar - HackMag

Auteur Drakylar sur HackMag.

https://hackmag.com/author/drakylar/

#Hardware

DEFPASS

Site DEFPASS.

https://www.defpass.com/

#Hardware

Relaying YubiKeys - Cube0x0

Article sur le relais des YubiKeys par Cube0x0.

https://cube0x0.github.io/Relaying-YubiKeys/

#Hardware

YubiKey Relay - GitHub

YubiKey Relay sur GitHub.

https://github.com/cube0x0/YubiKey-Relay

#Hardware

Firmwalker - GitHub

Firmwalker sur GitHub.

https://github.com/craigz28/firmwalker

#Hardware

Enabot Series Part 2 - DebugMen

Série Enabot Partie 2 sur DebugMen.

https://debugmen.dev/hardware-series/2022/08/01/enabot_series_part_2.html

#Hardware

Enabot Series Part 1 - DebugMen

Série Enabot Partie 1 sur DebugMen.

https://debugmen.dev/hardware-series/2022/02/18/enabot_series_part_1.html

#Hardware

Mindshare: How to Just Emulate It with QEMU - ZDI

Article sur l'émulation avec QEMU sur ZDI.

https://www.zerodayinitiative.com/blog/2020/5/27/mindshare-how-to-just-emulate-it-with-qemu

#Hardware

Amazon - Kit B01MUFRHQ2

Produit Amazon - Kit B01MUFRHQ2.

https://www.amazon.fr/gp/product/B01MUFRHQ2/ref=ppx_yo_dt_b_asin_title_o01_s00?ie=UTF8&psc=1

#Hardware

Amazon - Kit B00TM0W8ZY

Produit Amazon - Kit B00TM0W8ZY.

https://www.amazon.fr/gp/product/B00TM0W8ZY/ref=ppx_yo_dt_b_asin_title_o03_s00?ie=UTF8&psc=1

#Hardware

Kit de électronique Velleman WSG150 - Distrelec

Kit de électronique Velleman WSG150 sur Distrelec.

https://www.distrelec.ch/fr/kit-de-electronique-velleman-wsg150/p/18500308?trackQuery=kit+%c3%a9l%c3%a9ctronique&pos=17&origPos=17&origPageSize=50&track=true

#Hardware

Kit Roue de la Fortune électronique Velleman WSG152 - Distrelec

Kit Roue de la Fortune électronique Velleman WSG152 sur Distrelec.

https://www.distrelec.ch/fr/kit-roue-de-la-fortune-electronique-velleman-wsg152/p/18500324?trackQuery=kit+%c3%a9l%c3%a9ctronique&pos=19&origPos=19&origPageSize=50&track=true

#Hardware

Kit de électronique Velleman WSG113 - Distrelec

Kit de électronique Velleman WSG113 sur Distrelec.

https://www.distrelec.ch/fr/kit-de-electronique-velleman-wsg113/p/18520090?trackQuery=kit+%c3%a9l%c3%a9ctronique&pos=23&origPos=23&origPageSize=50&track=true

#Hardware

JBC BT-2BWA Soldeerstation 140Watt - EleShop

Station de soudage JBC BT-2BWA 140Watt sur EleShop.

https://eleshop.fr/jbc-bt-2bwa-soldeerstation-140watt.html

#Hardware

Pinecil Mini Fer à Souder Portable Intelligent - EleShop

Pinecil Mini Fer à Souder Portable Intelligent sur EleShop.

https://eleshop.fr/pinecil-mini-fer-a-souder-portable-intelligent.html

#Hardware

TomTop - Produit E16951

Produit TomTop - E16951.

https://www.tomtop.com/fr/p-e16951.html

#Hardware

Escaping from GUI Applications - HackTricks

Guide sur l'évasion des applications GUI sur HackTricks.

https://book.hacktricks.xyz/hardware-physical-access/escaping-from-gui-applications

#Hardware

ATM Kiosk Hacking Labs - Boschko

Laboratoires de piratage de kiosques ATM sur Boschko.

https://boschko.ca/atm-kiosk-hacking-labs/amp/

#Hardware

Breaking Out of Windows Kiosks Using Only Microsoft Edge - NVISO Blog

Article sur la sortie des kiosques Windows en utilisant uniquement Microsoft Edge sur le blog NVISO.

https://blog.nviso.eu/2022/05/24/breaking-out-of-windows-kiosks-using-only-microsoft-edge/

#Hardware

Firat Acar - NVISO Blog

Auteur Firat Acar sur le blog NVISO.

https://blog.nviso.eu/author/firat-acar/

#Hardware

Projets - Virtualabs

Projets sur Virtualabs.

https://virtualabs.fr/category/projets.html

#Hardware

Hardware Hacking Experiments - GitHub

Expériences de piratage matériel sur GitHub.

https://github.com/koutto/hardware-hacking/blob/master/Hardware-Hacking-Experiments-Jeremy-Brun-Nouvion-2020.pdf

#Hardware

Practical DMA Attack on Windows 10 - Synacktiv

Attaque DMA pratique sur Windows 10 par Synacktiv.

https://www.synacktiv.com/en/publications/practical-dma-attack-on-windows-10.html

#Hardware

UART, U-Boot, and USB - VoidStar Security

Article sur UART, U-Boot, et USB sur VoidStar Security.

https://voidstarsec.com/blog/uart-uboot-and-usb

#Hardware

HackRF One French - GitHub

HackRF One en français sur GitHub par PierreAdams.

https://github.com/PierreAdams/HackRF-One-French

#Hardware

RTL_433 - GitHub

RTL_433 sur GitHub par merbanan.

https://github.com/merbanan/rtl_433

#Hardware

DSTIKE - Store

Produits DSTIKE sur leur site officiel.

https://dstike.com/

#Hardware

Hardware Implant Attacks Part 1 - CSG GovTech

Attaques par implants matériels - Partie 1 sur CSG GovTech.

https://medium.com/csg-govtech/hardware-implant-attacks-part-1-console-access-attacks-on-vulnerable-iot-devices-104662f472dc

#Hardware

AutoHackOS - GitHub

AutoHackOS sur GitHub.

https://github.com/autohackos

#Hardware

Dronesploit - GitHub

Dronesploit sur GitHub par dhondta.

https://github.com/dhondta/dronesploit

#Hardware

MAME - GitHub

MAME sur GitHub par mamedev.

https://github.com/mamedev/mame

#Hardware

ZeroJay's Blog - Archive

Archive du blog ZeroJay.

https://web.archive.org/web/20201111185235/https://zerojay.com/blog/

#Hardware

VoidStar Security

Site VoidStar Security.

https://voidstarsec.com/

#Hardware

SF Cabinet - GitHub

SF Cabinet sur GitHub par wrongbaud.

https://github.com/wrongbaud/sf-cabinet

#Hardware

Bus Pirate - GitHub

Bus Pirate sur GitHub par BusPirate.

https://github.com/BusPirate/Bus_Pirate

#Hardware

Exploiting Embedded APIs by Dumping Firmware - Dana Epp

Exploitation des APIs embarquées par le dumping de firmware sur Dana Epp.

https://danaepp.com/exploiting-embedded-apis-by-dumping-firmware

#Hardware

Dana Epp - Author Page

Page d'auteur Dana Epp.

https://danaepp.com/author/danaepp42

#Hardware

Ph0wn My First IoT CTF Part 3 - Sébastien Andrivet

Partie 3 du CTF IoT Ph0wn par Sébastien Andrivet.

http://sebastien.andrivet.com/en/posts/ph0wn-my-first-iot-ctf-part-3/

#Hardware

Protocol Depth: USB Physical Layer - Luigi C. Filho

Profondeur du protocole: Couche physique USB par Luigi C. Filho sur LinkedIn.

https://www.linkedin.com/pulse/protocol-depth-usb-physical-layer-luigi-c-filho/

#Hardware

Reverse Engineering Architecture Pinout PLC - SEC Consult

Ingénierie inverse de l'architecture pinout PLC par SEC Consult.

https://sec-consult.com/blog/detail/reverse-engineering-architecture-pinout-plc/

#Hardware

Flash Dumping Part I - Quarkslab

Dumping de flash - Partie I sur Quarkslab.

https://blog.quarkslab.com/flash-dumping-part-i.html

#Hardware

I Hack U-Boot - Synacktiv

Je pirate U-Boot par Synacktiv.

https://www.synacktiv.com/publications/i-hack-u-boot

#Hardware

Dumping Firmware from a Reolink Camera - Micah VanDeusen

Dumping de firmware d'une caméra Reolink par Micah VanDeusen.

https://micahvandeusen.com/dumping-firmware-from-a-reolink-camera/

#Hardware

JTAGenum - GitHub

JTAGenum sur GitHub par cyphunk.

https://github.com/cyphunk/JTAGenum/

#Hardware

Car Hacking 101 - Yogesh Ojha

Guide pratique pour pirater les systèmes CAN Bus à l'aide du simulateur de cluster d'instruments - Partie I par Yogesh Ojha.

https://medium.com/@yogeshojha/car-hacking-101-practical-guide-to-exploiting-can-bus-using-instrument-cluster-simulator-part-i-cd88d3eb4a53

#Hardware

Flipper Zero Brute Force - GitHub

Flipper Zero Brute Force sur GitHub par tobiabocchi.

https://github.com/tobiabocchi/flipperzero-bruteforce

#Hardware

RoboCoffee - Article

Article RoboCoffee.

https://robocoffee.de/?p=436

#Hardware

RoboCoffee - Author Page

Page d'auteur RoboCoffee.

https://robocoffee.de/?author=1

#Hardware

Shooting Yourself in the Flags: Jailbreaking the Sonos Era 100 - NCC Group

Jailbreaking the Sonos Era 100 par NCC Group.

https://research.nccgroup.com/2023/12/04/shooting-yourself-in-the-flags-jailbreaking-the-sonos-era-100/

#Hardware

JTAG iPhone Pico - MattEyeux

JTAG iPhone Pico par MattEyeux.

https://matteyeux.github.io/posts/jtag-iphone-pico/

#Hardware

JTAG HDD - WrongBaud

JTAG HDD par WrongBaud.

https://wrongbaud.github.io/posts/jtag-hdd/

#Hardware

ChatGPT vient de se faire détrôner par des génies français

Vidéo YouTube sur ChatGPT et l'avancée de l'IA.

https://www.youtube.com/watch?v=mc2Qli9ImOI

#IA

Dasha AI - Log Loss Function

Article sur la fonction de perte log.

https://dasha.ai/en-us/blog/log-loss-function

#IA

GeeksforGeeks - Deep Learning Tutorial

Tutoriel sur l'apprentissage profond.

https://www.geeksforgeeks.org/deep-learning-tutorial/

#IA

Machine Learning Security - DeepExploit

Projet DeepExploit pour la sécurité en apprentissage automatique.

https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit

#IA

Descript

Descript - Outil d'édition audio et vidéo.

https://www.descript.com/

#IA

Netflix Tech Blog - Machine Learning for Fraud Detection

Article sur la détection de fraude avec l'apprentissage automatique chez Netflix.

https://netflixtechblog.com/machine-learning-for-fraud-detection-in-streaming-services-b0b4ef3be3f6

#IA

Hacktback - Exploitation des modèles GPT personnalisés

Article sur l'exploitation des modèles GPT personnalisés.

https://hacktback.fr/nos-ressources/exploitation-des-modeles-gpt-personnalises/

#IA

FlowGPT - DarkGPT Official Edition

DarkGPT Official Edition par FlowGPT.

https://flowgpt.com/p/darkgpt-official-edition

#IA

Mistral AI

Plateforme Mistral AI.

https://mistral.ai/

#IA

Clubic - Des chercheurs créent le tout premier ver informatique capable de se répandre dans les syst

Article sur le premier ver informatique pour les systèmes d'IA.

https://www.clubic.com/actualite-520456-des-chercheurs-creent-le-tout-premier-ver-informatique-capable-de-se-repandre-dans-les-systemes-d-ia.html

#IA

Cursor.sh

Site web Cursor.sh.

https://cursor.sh/

#IA

Autogluon

Autogluon sur GitHub.

https://github.com/autogluon/autogluon

#IA

SpecterOps - Summoning Ragnarok with Your Nemesis

Article sur l'invocation de Ragnarok avec votre Némésis.

https://posts.specterops.io/summoning-ragnarok-with-your-nemesis-7c4f0577c93b

#IA

Trail of Bits - Exploiting ML Models with Pickle File Attacks Part 1

Article sur l'exploitation des modèles ML avec des attaques de fichiers Pickle (partie 1).

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1/

#IA

Trail of Bits - Sarah Miller

Articles par Sarah Miller sur Trail of Bits.

https://blog.trailofbits.com/author/sarahmiller239

#IA

OSINT Origins #1 - Jean-Marc Manach/@manhack

Conférence sur les origines de l'OSINT par Jean-Marc Manach.

https://www.youtube.com/watch?v=XrTFzZ77eEI

#Osint

LinkedIn OSINT Techniques feat. Mishaal Khan

Techniques avancées d'OSINT sur LinkedIn avec Mishaal Khan.

https://www.youtube.com/watch?v=bz4oZBR3LEk

#Osint

Titre non disponible

Conférence sur OSINT par une chaîne YouTube non identifiée.

https://www.youtube.com/channel/UCSxk_CUfES4ly5Sspc0Vorw

#Osint

🇫🇷[Workshop] OSINT par mot de passe avec h8mail - Khast3x

Atelier en français sur l'OSINT par mot de passe avec h8mail par Khast3x.

https://www.youtube.com/watch?v=u1frAWJE5_Q

#Osint

OSINT Origins #2 - _IntelligenceX/Peter Kleissner

Deuxième partie des origines de l'OSINT par _IntelligenceX/Peter Kleissner.

https://www.youtube.com/watch?v=UsRAziRLsY8

#Osint

Google Hacking Techniques

Techniques de piratage Google pour l'OSINT.

https://securitytrails.com/blog/google-hacking-techniques

#Osint

SocialPwned

Outil pour la recherche de fuites de données sociales.

https://github.com/MrTuxx/SocialPwned

#Osint

Yandex Search Operators

Guide des opérateurs de recherche sur Yandex.

https://yandex.com/support/search/query-language/search-operators.html

#Osint

PhoneInfoga

Outil d'OSINT pour la recherche d'informations téléphoniques.

https://github.com/sundowndev/PhoneInfoga

#Osint

GHunt

Outil d'OSINT pour l'investigation sur Google Workspace.

https://github.com/mxrch/GHunt

#Osint

Tweet par AFP Factuel

Tweet par AFP Factuel concernant l'actualité.

https://twitter.com/afpfactuel/status/1413862177304350722?s=21

#Osint

Google Lens

Application Google Lens pour l'analyse d'images.

https://lens.google/

#Osint

DumpsterDiver

Outil pour la recherche de données sensibles dans les dépôts de déchets.

https://github.com/securing/DumpsterDiver

#Osint

OSINT Flight Tracking Challenge

Défi de suivi de vols pour l'OSINT.

https://haax.fr/fr/writeups/osint-geoint/osint-flight-tracking-challenge/

#Osint

SunCalc

Calculateur de position du soleil et de la lune.

http://suncalc.net/

#Osint

Facebook/Instagram OSINT

Extension Firefox pour l'OSINT sur Facebook et Instagram.

https://addons.mozilla.org/fr/firefox/addon/facebook-instagram-osint/

#Osint

OSINT 101

Introduction à l'OSINT et ses principes de base.

https://0xraven.fr/articles/osint-101/

#Osint

TGStat

Moteur de recherche et d'analyse de statistiques Telegram.

https://tgstat.ru/en/search

#Osint

Osintgram

Outil d'OSINT pour Instagram.

https://github.com/Datalux/Osintgram

#Osint

EPIEOS Tools

Outils pour l'OSINT.

https://tools.epieos.com/

#Osint

Pentesting Kubernetes from the Outside

Guide de pentesting Kubernetes depuis l'extérieur.

https://book.hacktricks.xyz/pentesting/pentesting-kubernetes/pentesting-kubernetes-from-the-outside

#Osint

Using Shadows and Optics to Geolocate a Photo in a US Military Base

Méthodes pour géolocaliser une photo sur une base militaire US.

https://medium.com/@drstache/using-shadows-and-optics-to-geolocate-a-photo-in-a-us-military-base-29bd3086283c

#Osint

MarineTraffic

Suivi des navires et données maritimes.

https://www.marinetraffic.com/

#Osint

WiGLE

Base de données de réseaux sans fil mondiaux.

https://www.cqcore.uk/the-world-of-wigle/

#Osint

Auteur sur CQCore

Articles par l'auteur sur CQCore.

https://www.cqcore.uk/author/cq21_pqp8gp56

#Osint

SteamID Finder

Recherche d'informations sur les identifiants Steam.

https://www.steamidfinder.com/

#Osint

Censys

Recherche et analyse des appareils connectés à Internet.

https://censys.io/

#Osint

IntelX

Moteur de recherche pour les données d'intelligence.

https://intelx.io/

#Osint

Enigma

Base de données pour l'intelligence et la recherche de données.

https://enigma.com/

#Osint

OpenCorporates

Base de données sur les entreprises mondiales.

https://opencorporates.com/

#Osint

LittleSis

Base de données pour explorer les relations de pouvoir.

https://littlesis.org/

#Osint

Lampyre

Outil pour l'analyse des réseaux et la recherche d'informations.

https://lampyre.io/

#Osint

Ransom Wiki

Wiki sur les informations relatives aux ransomwares.

https://ransom.wiki/

#Osint

The Ultimate OSINT Collection

Collection ultime d'outils d'OSINT.

https://start.me/p/DPYPMz/the-ultimate-osint-collection

#Osint

Tweet par Podalirius

Tweet par Podalirius sur un sujet non précisé.

https://twitter.com/podalirius_/status/1481670627048132608

#Osint

PimEye

Outil de recherche d'images en ligne.

https://pimeye

#Osint

Watools

Outils pour WhatsApp.

https://watools.io/

#Osint

ProtOSINT

Outil pour la recherche et l'exploitation d'informations.

https://github.com/pixelbubble/ProtOSINT

#Osint

Search by Image

Extension Firefox pour la recherche par image.

https://addons.mozilla.org/en-US/firefox/addon/search_by_image/

#Osint

JTAGenum

Outil pour l'exploration des dispositifs JTAG.

https://github.com/novitae/sterraxcyl

#Osint

LinkedInt

Outil pour la collecte d'informations LinkedIn.

https://github.com/vysecurity/LinkedInt

#Osint

SIV-Auto

SIV-Auto pour les informations sur les véhicules.

https://siv-auto.fr/

#Osint

AviarLabs

AviarLabs pour les solutions de cybersécurité.

https://fr.aviarlabs.com/

#Osint

DMS Decimal

Système de décimalisation des coordonnées DMS.

https://www.fcc.gov/media/radio/dms-decimal

#Osint

GEOINT - Frontières sino-birmanes

Analyse GEOINT des frontières sino-birmanes.

https://medium.com/@meakaaet/geoint-1-fronti%C3%A8res-sino-birmanes-f77bdfb581ae

#Osint

GeoTips

Conseils et astuces pour l'analyse géospatiale.

https://geotips.net/

#Osint

Auteur sur GeoTips

Articles par l'auteur sur GeoTips.

https://geotips.net/author/admin

#Osint

Discord ID

Recherche d'informations sur l'ID Discord.

https://discord.id/

#Osint

GitRob

Outil pour la recherche de secrets dans les dépôts Git.

https://github.com/michenriksen/gitrob

#Osint

GitLeaks

Outil pour la recherche de fuites d'informations sensibles dans les dépôts Git.

https://github.com/zricethezav/gitleaks

#Osint

TheHarvester

Outil pour la collecte d'informations sur les courriels, les sous-domaines, etc.

https://github.com/laramies/theHarvester

#Osint

LinkedIn2Username

Outil pour la recherche de noms d'utilisateur LinkedIn à partir d'adresses électroniques.

https://github.com/initstring/linkedin2username

#Osint

Awesome Hacker Search Engines

Liste des moteurs de recherche pour hackers.

https://github.com/edoardottt/awesome-hacker-search-engines

#Osint

Depix

Outil pour récupérer du texte à partir d'images floutées.

https://github.com/beurtschipper/Depix

#Osint

BlackSide

Présentation sur BlackSide.

https://www.beautiful.ai/player/-MsnhEMkgvXsZpppPkNM/BlackSide

#Osint

Skype Hidden OSINT Goldmine

Guide sur l'extraction de données cachées sur Skype.

https://whitehatinspector.blogspot.com/2021/03/skype-hidden-osint-goldmine.html

#Osint

IBAN Calculator

Calculateur IBAN en ligne.

https://www.ibancalculator.com/

#Osint

OSINT Collection

Collection d'outils OSINT.

https://github.com/Ph055a/OSINT_Collection

#Osint

Mailfoguess

Outil pour deviner les adresses e-mail.

https://github.com/WildSiphon/Mailfoguess

#Osint

Ozint

Guide des outils d'OSINT.

https://ozint.eu/

#Osint

Overpass Turbo

Outil pour interroger les données OpenStreetMap.

https://overpass-turbo.eu/

#Osint

Geoportail

Service de cartographie en ligne du gouvernement français.

https://www.geoportail.gouv.fr/

#Osint

CachedView

Affichage de la version en cache d'une page Web.

http://cachedview.com/

#Osint

Décès en France

Base de données des décès en France.

https://www.deces-en-france.fr/

#Osint

Annuaire des Entreprises

Base de données des entreprises en France.

https://annuaire-entreprises.data.gouv.fr/

#Osint

Societe Ninja

Outils pour l'investigation sur les entreprises.

https://www.societe.ninja/index.html

#Osint

GitFive

Outil pour analyser les dépôts Git.

https://github.com/mxrch/gitfive

#Osint

Emdofi

Outil pour l'enquête sur les domaines Internet.

https://github.com/novitae/emdofi

#Osint

Grabbing Old Bitmoji Outfits with Backmoji

Technique pour récupérer des tenues Bitmoji anciennes.

https://webbreacher.com/2022/10/24/grabbing-old-bitmoji-outfits-with-backmoji/

#Osint

WebBreacher

Articles par WebBreacher.

https://webbreacher.com/author/webbreacher

#Osint

Gau

Outil pour l'extraction et l'analyse des URL.

https://github.com/lc/gau

#Osint

H8Mail v1.7.2

Outil pour l'OSINT par courriel.

https://github.com/khast3x/h8mail

#Osint

GHunt v2.0.1

Outil pour la recherche d'informations sur Google Workspace.

https://github.com/mxrch/GHunt/releases/tag/v2.0.1

#Osint

Email Headers Analyzer

Analyseur de en-têtes de courriel.

https://mxtoolbox.com/EmailHeaders.aspx

#Osint

Google Vous Connaissez

Article sur Google par Elsicarius.

https://elsicarius.fr/google-vous-connaissez

#Osint

Elsicarius

Articles par Elsicarius.

https://elsicarius.fr/author/s3cur3_tr4a4xx_adm1n_acc0un

#Osint

LeakPeek

Outil pour rechercher des fuites de données.

https://leakpeek.com/

#Osint

Six Tools to Help with Geolocation

Six outils pour aider à la géolocalisation.

https://nixintel.info/osint-tools/six-tools-to-help-with-geolocation/

#Osint

NixIntel

Articles par NixIntel.

https://nixintel.info/author/nixintel

#Osint

Peasant

Outil pour le test de sécurité de serveurs.

https://github.com/arch4ngel/peasant

#Osint

NQNTNQNQMB

Outil pour le recensement d'informations.

https://github.com/megadose/nqntnqnqmb

#Osint

LinkedInt

Outil pour la collecte d'informations LinkedIn.

https://github.com/vysecurity/LinkedInt

#Osint

Understanding and Using Google IDs in an OSINT Strategy

Guide pour comprendre et utiliser les identifiants Google dans une stratégie OSINT.

https://www.eduba.school/blog/comment-comprendre-et-utiliser-les-google-id-dans-une-strategie-osint

#Osint

Xeuledoc

Documentation sur Xeuledoc par Malfrats.

https://github.com/Malfrats/xeuledoc

#Osint

Public Intelligence Feeds

Alimentation publique de l'intelligence.

https://github.com/CriticalPathSecurity/Public-Intelligence-Feeds

#Osint

DeepDarkCTI

Centre de cyber renseignement.

https://github.com/fastfire/deepdarkCTI

#Osint

OnionSearchtion

Outil pour la recherche sur le Dark Web.

https://github.com/megadose/OnionSearchtion

#Osint

SpiderFoot

Outil pour l'analyse des menaces et de l'intelligence.

https://www.spiderfoot.net/

#Osint

SpiderFoot

Articles par Steve sur SpiderFoot.

https://www.spiderfoot.net/author/steve

#Osint

HexaCTF

Capture du drapeau hexagonal.

https://github.com/1sis/HexaCTF

#Osint

Favicon to MurmurHash

Extension Firefox pour convertir le favicon en MurmurHash.

https://addons.mozilla.org/fr/firefox/addon/favicon-to-murmurhash/

#Osint

Tweet par EPCyber

Tweet par EPCyber sur un sujet non précisé.

https://twitter.com/epcyber/status/1630207876382744584?t=LE4pnzCmIpedmrZag1qdrg&s=19

#Osint

OSINT Tracker

Outil pour le suivi et l'analyse de l'OSINT.

https://www.osintracker.com/

#Osint

Cloud OSINT

Outil pour l'analyse et la collecte d'informations dans le cloud.

https://github.com/7WaySecurity/cloud_osint

#Osint

Wholeaked

Outil pour la collecte d'informations exposées.

https://github.com/utkusen/wholeaked

#Osint

SpiderFoot

Outil pour l'analyse des menaces et de l'intelligence.

https://github.com/smicallef/spiderfoot

#Osint

Gvision

Outil pour l'analyse d'images.

https://github.com/GONZOsint/gvision

#Osint

Postmaniac

Outil pour l'analyse de courriels.

https://github.com/boringthegod/postmaniac

#Osint

Google Patents

Recherche de brevets Google.

https://patents.google.com/

#Osint

Carto Graou

Outil pour la visualisation de données.

https://carto.graou.info/

#Osint

0t.rocks

Moteur de recherche OSINT.

https://search.0t.rocks/

#Osint

Search By Image

Outil pour la recherche par image.

https://github.com/dessant/search-by-image

#Osint

DeepDarkCTI

Centre de cyber renseignement.

https://github.com/fastfire/deepdarkCTI

#Osint

OSINT Industries

Ressources et outils OSINT.

http://osint.industries/

#Osint

PimEyes Crack UserStyle

Personnalisation de PimEyes pour contourner les restrictions.

https://github.com/ItsIgnacioPortal/PimEyes-Crack-UserStyle

#Osint

EagleEye

Outil pour l'enquête numérique.

https://github.com/ThoughtfulDev/EagleEye

#Osint

Pinterest Lens

Outil de recherche visuelle de Pinterest.

https://help.pinterest.com/fr/article/pinterest-lens

#Osint

LinkedIn

Profil LinkedIn de recherche.

https://lnkd.in/gs9dFrke

#Osint

Fuzzing Labs

Articles par Fuzzing Labs.

https://fuzzinglabs.com/author/admin8913

#Osint

Dork Generator

Générateur de dorks pour les recherches Google.

https://yuraloginoff.github.io/dork-generator/

#Osint

EmploLeaks

Outil pour la recherche de fuites d'informations sur les employés.

https://github.com/infobyte/emploleaks

#Osint

Telegram Get Remote IP

Outil pour obtenir l'adresse IP distante d'un utilisateur Telegram.

https://github.com/lleon1435/telegram-get-remote-ip

#Osint

PSBDMP

Recherche de données publiques.

https://psbdmp.ws/

#Osint

CTI

Articles par Sam0x90 sur le renseignement sur les menaces.

https://github.com/Sam0x90/CTI

#Osint

Tweet URL

Tweet non spécifié.

https://t.co/3lGXepf041

#Osint

OhShINT

Guide de l'outil OhShINT.

https://github.com/OhShINT/ohshint.gitbook.io/

#Osint

Graph-Based Intelligence Analysis

Analyse du renseignement basée sur les graphes.

https://linkurious.com/blog/graph-based-intelligence-analysis/

#Osint

Linkurious

Plateforme pour l'analyse des graphes.

https://linkurious.com/

#Osint

Gephi

Outil pour l'analyse des graphes.

https://gephi.org/

#Osint

i2 Analyst's Notebook

Outil d'analyse de données.

https://i2group.com/i2-analysts-notebook

#Osint

APIs for OSINT

Collection d'API pour l'OSINT.

https://github.com/cipher387/API-s-for-OSINT

#Osint

WhatsApp OSINT

Outil pour la collecte d'informations sur WhatsApp.

https://github.com/jasperan/whatsapp-osint

#Osint

Well-Known.dev

Outil pour l'exploration de ressources .well-known.

https://well-known.dev/

#Osint

PyMeta

Outil pour l'analyse de métadonnées.

https://github.com/m8sec/pymeta

#Osint

Memory.lol

Outil pour la recherche de mémoires compromis.

https://github.com/travisbrown/memory.lol

#Osint

BushidoToken Blog

Articles par BushidoToken.

https://blog.bushidotoken.net/

#Osint

Censys

Plateforme pour l'exploration de l'Internet.

https://censys.com/

#Osint

CTI Fundamentals

Fondamentaux du renseignement sur les menaces.

https://github.com/curated-intel/CTI-fundamentals

#Osint

Web Check

Outil pour la vérification des sites Web.

https://web-check.xyz/

#Osint

Beneficial Ownership Registers Interconnection System

Système d'interconnexion des registres de propriété bénéficiaire.

https://e-justice.europa.eu/38590/EN/beneficial_ownership_registers_interconnection_system_boris?EUROPEAN_UNION&action=maximize&idSubpage=1

#Osint

BODACC

Base de données des avis au BODACC.

https://www.bodacc.fr/

#Osint

OSINT Stuff Tool Collection

Collection d'outils OSINT.

https://github.com/cipher387/osint_stuff_tool_collection

#Osint

Noobox 2

Extension Firefox pour la gestion de notes.

https://addons.mozilla.org/fr/firefox/addon/noobox_2/

#Osint

Multi-Account Containers

Extension Firefox pour la gestion de comptes.

https://addons.mozilla.org/fr/firefox/addon/multi-account-containers/

#Osint

MySudo

Service pour la gestion de l'identité.

https://mysudo.com/

#Osint

InfoTracer

Service de recherche d'informations en ligne.

https://infotracer.com/

#Osint

Deepware Scanner

Outil pour l'analyse de l'information en ligne.

https://scanner.deepware.ai/

#Osint

Breach Forums

Forum pour la discussion des violations de données.

https://breachforums.is/showthread.php?tid=97611

#Osint

CartoRadio

Base de données sur la couverture radio.

https://www.cartoradio.fr/

#Osint

SondeHub

Plateforme pour l'exploitation de données.

https://sondehub.org/

#Osint

QRZ Lookup

Recherche de données radioamateurs.

https://www.qrz.com/lookup/

#Osint

Societe Ninja

Outils pour l'investigation sur les entreprises.

https://www.societe.ninja/index.html

#Osint

ExtPose

Extension pour la gestion des onglets Chrome.

https://extpose.com/ext/haogkfoekgcdihiijdhjnpnbbodkgfmb

#Osint

Anonymous Planet Guide

Guide pour l'anonymat en ligne.

https://anonymousplanet.org/guide.html

#Osint

OSINT Tool

Outils pour l'investigation en ligne.

https://www.osint-tool.com/

#Osint

OSINT Tool

Articles sur les outils OSINT.

https://www.osint-tool.com/author/wordpress

#Osint

MetaDetective

Outil pour l'analyse des métadonnées.

https://github.com/franckferman/MetaDetective

#Osint

Awesome Browser Extensions for OSINT

Liste d'extensions de navigateur pour l'OSINT.

https://github.com/osintambition/Awesome-Browser-Extensions-for-OSINT

#Osint

GeoSpy

Outil pour l'analyse et la collecte de données géospatiales.

https://geospy.ai/

#Osint

Introduction to fuzzing

Introduction to fuzzing - YouTube

https://www.youtube.com/watch?v=o-3c2OGsxlk

#Programming

Neso Academy

Chaîne YouTube Neso Academy

https://www.youtube.com/@nesoacademy/videos

#Programming

Array Map in 100 Seconds

Array Map in 100 Seconds - YouTube

https://www.youtube.com/watch?v=DC471a9qrU4

#Programming

Low Level Learning

Chaîne YouTube Low Level Learning

https://www.youtube.com/@LowLevelLearning

#Programming

DATA STRUCTURES you MUST know (as a Software Developer)

DATA STRUCTURES you MUST know (as a Software Developer) - YouTube

https://www.youtube.com/watch?v=sVxBVvlnJsM

#Programming

Brackeys

Chaîne YouTube Brackeys

https://www.youtube.com/@Brackeys

#Programming

LLVM et les runtime modernes

LLVM et les runtime modernes - YouTube

https://www.youtube.com/watch?v=AeQzAfrxbe4

#Programming

Pyrser Selector Language par Lionel Auroux

Pyrser Selector Language par Lionel Auroux - YouTube

https://www.youtube.com/watch?v=POk5X6QGRRU

#Programming

COMMENT DEVELOPPER UN INTERPRÉTEUR ASSEMBLEUR EN GOLANG #golangtuto

COMMENT DEVELOPPER UN INTERPRÉTEUR ASSEMBLEUR EN GOLANG #golangtuto - YouTube

https://www.youtube.com/watch?v=FcTAHvmGxf8

#Programming

Créer un compilateur avec LLVM et ANTLR4

Créer un compilateur avec LLVM et ANTLR4 - YouTube

https://www.youtube.com/watch?v=2teHuAAvQeI

#Programming

LSE Week - Discovery of Pyrser - Lionel Auroux

LSE Week - Discovery of Pyrser - Lionel Auroux - YouTube

https://www.youtube.com/watch?v=FY4U2gQcoXo

#Programming

OCR with Tesseract

Utilisation de Tesseract pour l'OCR

https://nanonets.com/blog/ocr-with-tesseract/

#Programming

Docker Remove Cheatsheet

Cheat sheet pour supprimer des conteneurs Docker

https://shisho.dev/blog/posts/docker-remove-cheatsheet/

#Programming

Golang Runtime Hacking

Guide de piratage du runtime Golang

https://github.com/golang/go/blob/master/src/runtime/HACKING.md

#Programming

Les Threads en C/C++

Introduction aux threads en C/C++

https://ocamil.com/index.php/c-c/c-c-les-thread

#Programming

AI For Beginners by Microsoft

AI For Beginners par Microsoft

https://github.com/microsoft/AI-For-Beginners

#Programming

Shellcoding CTF Writeups

Writeups de CTF sur le shellcoding

https://github.com/VulnHub/ctf-writeups/blob/master/2015/ringzer0/shellcoding.md

#Programming

Nouvelle méthode de calcul matriciel en IA

Nouvelle méthode de calcul matriciel en IA

https://trustmyscience.com/intelligence-artificielle-nouvelle-methode-calcul-matriciel-acceleration-ordinateurs/

#Programming

Articles par Trust My Science

Articles par Moles sur Trust My Science

https://trustmyscience.com/author/moles/

#Programming

Python Regex sur W3Schools

Guide sur les expressions régulières en Python sur W3Schools

https://www.w3schools.com/python/python_regex.asp

#Programming

Introduction to Machine Learning

Introduction to Machine Learning - Partie 1

https://ahampriyanshu.com/blog/intro-to-ml-part-1-introduction/

#Programming

TheAlgorithms GitHub Repository

TheAlgorithms GitHub Repository

https://github.com/TheAlgorithms

#Programming

Empire Listeners Library

Bibliothèque Empire Listeners

https://github.com/EmpireProject/Empire/blob/master/lib/listeners/

#Programming

BetterTUI Python Package

Package Python BetterTUI

https://pypi.org/project/betterTUI/

#Programming

Memory Management and Garbage Collection in Python

Gestion de la mémoire et collecte des déchets en Python

https://towardsdatascience.com/memory-management-and-garbage-collection-in-python-c1cb51d1612c

#Programming

PyDoc Python Documentation

Documentation PyDoc pour Python

https://docs.python.org/fr/3/library/pydoc.html

#Programming

Z3 Playground by 0vercl0k

Z3 Playground par 0vercl0k

https://github.com/0vercl0k/z3-playground

#Programming

CryptoZombies Blockchain Course

Cours CryptoZombies sur la blockchain

https://cryptozombies.io/en/course/

#Programming

Unwrapping Rust's Errors

Décodage des erreurs de Rust

https://medium.com/swlh/unwrapping-rusts-errors-552e583e2963

#Programming

Typage en Python

Typage en Python

https://techblog.deepki.com/typage-en-python/

#Programming

Refactoring Guru

Site sur les techniques de refactoring

https://refactoring.guru/

#Programming

Rust for Noobs Course

Cours Rust pour débutants

https://training.zeropointsecurity.co.uk/courses/rust-for-n00bs

#Programming

Intel Intrinsics Guide

Guide des intrinsics Intel

https://www.intel.com/content/www/us/en/docs/intrinsics-guide/index.html

#Programming

LazyGit GitHub Repository

LazyGit GitHub Repository

https://github.com/jesseduffield/lazygit

#Programming

Offensive Rust Course

Cours Rust offensif

https://redteamsorcery.teachable.com/p/offensive-rust

#Programming

Rust Tips and Tricks by Kudaes

Rust Tips and Tricks par Kudaes

https://github.com/Kudaes/rust_tips_and_tricks

#Programming

Flask Examples by Swafox

Exemples Flask par Swafox

https://github.com/Swafox/Flask-examples

#Programming

Inox Programming Language

Langage de programmation Inox

https://github.com/inoxlang/inox

#Programming

What I've Learned About Formal Methods

Ce que j'ai appris sur les méthodes formelles

https://jakob.space/blog/what-ive-learned-about-formal-methods.html

#Programming

Mmap-Go by Edsrzf

Mmap-Go par Edsrzf

https://github.com/edsrzf/mmap-go

#Programming

Py-Tree-Sitter by Tree-Sitter

Py-Tree-Sitter par Tree-Sitter

https://github.com/tree-sitter/py-tree-sitter

#Programming

Exercism Programming Exercises

Exercices de programmation Exercism

https://exercism.org/

#Programming

Deep Dive Into Python's VM Story of Load Const Bug

Plongée profonde dans le VM de Python - Load Const Bug

https://doar-e.github.io/blog/2014/04/17/deep-dive-into-pythons-vm-story-of-load_const-bug/

#Programming

Coroutines in C

Coroutines en C

https://cyp.sh/blog/coroutines-in-c

#Programming

OS Development with Rust

Développement OS avec Rust

https://os.phil-opp.com/fr/

#Programming

Paging Introduction

Introduction à la pagination

https://os.phil-opp.com/paging-introduction/

#Programming

Writing Windows Debugger Part 2

Écriture d'un débogueur Windows - Partie 2

https://www.codeproject.com/Articles/132742/Writing-Windows-Debugger-Part-2

#Programming

Compilers Principles Techniques and Tools

Compilers: Principles, Techniques, and Tools

https://a.co/d/hUXgWDr

#Programming

LLVM Obfuscation Tutorial

Tutoriel sur l'obfuscation avec LLVM

https://github.com/quarkslab/llvm-passes/blob/master/doc/llvm_obfuscation_tutorial.rst

#Programming

j5afe GitHub Repository

j5afe GitHub Repository

https://github.com/Lexterl33t/j5afe

#Programming

Bachelor's Thesis by Marius Schulz

Bachelor's Thesis by Marius Schulz

https://github.com/mariusschulz/bachelors-thesis/blob/master/thesis.pdf

#Programming

CLOC GitHub Repository

CLOC (Count Lines of Code) GitHub Repository

https://github.com/AlDanial/cloc

#Programming

Martin Heinz Blog Post

Martin Heinz Blog Post

https://martinheinz.dev/blog/24

#Programming

Software Engineering Notes - Clean Architecture

Software Engineering Notes - Clean Architecture

https://github.com/LordNoteworthy/software-engineering-notes/blob/main/Clean-Architecture.md

#Programming

JSON Crack

JSON Crack

https://jsoncrack.com/

#Programming

Intro to C for Windows Developers - SANS Webcast

Intro to C for Windows Developers - SANS Webcast

https://www.sans.org/webcasts/intro-c-windows-devs/

#Programming

LIEF GitHub Repository

LIEF (Library to Instrument Executable Formats) GitHub Repository

https://github.com/lief-project/LIEF

#Programming

Writing a Windows Fuzzer from Scratch

Writing a Windows Fuzzer from Scratch

https://www.legacyy.xyz/vr/windows/2023/10/23/writing-a-windows-fuzzer-from-scratch.html

#Programming

Gephi GitHub Repository

Gephi (Graph Visualization and Manipulation Software) GitHub Repository

https://github.com/gephi/gephi

#Programming

Graph Databases with Neo4j

Graph Databases with Neo4j

https://www.infoq.com/fr/articles/graph-nosql-neo4j/

#Programming

Neo4rs Rust Library

Neo4rs Rust Library

https://docs.rs/neo4rs/latest/neo4rs/

#Programming

Neo4j Labs GitHub Repository

Neo4j Labs GitHub Repository

https://github.com/neo4j-labs/neo4rs

#Programming

Aura Graph Database by Neo4j

Aura Graph Database by Neo4j

https://neo4j.com/cloud/platform/aura-graph-database/?ref=nav-get-started-cta

#Programming

Raspberry Pi OS Tutorials with Rust

Raspberry Pi OS Tutorials with Rust

https://github.com/rust-embedded/rust-raspberrypi-OS-tutorials

#Programming

Binary Tree on Wikipedia

Binary Tree on Wikipedia

https://fr.wikipedia.org/wiki/Arbre_binaire

#Programming

Awesome Rust GitHub Repository

Awesome Rust GitHub Repository

https://github.com/rust-unofficial/awesome-rust

#Programming

Write a C Interpreter Tutorial

Write a C Interpreter Tutorial

https://github.com/lotabout/write-a-C-interpreter/tree/master/tutorial/en

#Programming

Compilers: Principles, Techniques, and Tools

Compilers: Principles, Techniques, and Tools

https://www.amazon.com/Compilers-Principles-Techniques-Tools-2nd/dp/0321486811

#Programming

Bell Labs on Wikipedia

Bell Labs on Wikipedia

https://fr.wikipedia.org/wiki/Laboratoires_Bell

#Programming

Sigma.js Official Website

Sigma.js Official Website

https://www.sigmajs.org/

#Programming

Learn C Programming

Learn C Programming

https://www.learn-c.org/

#Programming

Bifrost GitHub Repository

Bifrost GitHub Repository

https://github.com/its-a-feature/bifrost

#Programming

Docker Update Container on Code Change

Docker Update Container on Code Change

https://stackoverflow.com/questions/63279765/docker-how-to-update-your-container-when-your-code-changes

#Programming

Unreal Engine C++ Quick Start Guide

Unreal Engine C++ Quick Start Guide

https://docs.unrealengine.com/5.3/en-US/unreal-engine-cpp-quick-start/

#Programming

Computation Subtyping

Computation Subtyping

https://okmij.org/ftp/Computation/Subtyping/

#Programming

Blog by Daniel Lemire

Blog by Daniel Lemire

https://lemire.me/blog/2024/

#Programming

Social Engineering the Windows Kernel - James Forshaw, Google

Vidéo sur l'ingénierie sociale dans le noyau Windows

https://www.youtube.com/watch?v=eF-nJnPycXs

#Pwn

[FSOP / heap exploitation - SECCON Quals] babyfile - _IO_obstack_ju...

Vidéo sur l'exploitation de heap

https://www.youtube.com/watch?v=1xGss7qd6oA

#Pwn

Heap Overflow on iOS/Android ARM64

Vidéo sur le dépassement de tampon dans les environnements iOS/Android ARM64

https://www.youtube.com/watch?v=CmTA05bcawk

#Pwn

OffSec Club

Vidéo du club OffSec

https://youtube.com/channel/UCODQhmnWoV4Qg3KBJLwHT4Q

#Pwn

Windows kernel exploitation techniques - Adrien Garin - LSE Week 2016

Vidéo sur les techniques d'exploitation du noyau Windows

https://www.youtube.com/watch?v=f8hTwFpRphU

#Pwn

DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation ...

Vidéo sur l'exploitation du noyau Windows 10

https://www.youtube.com/watch?v=Gu_5kkErQ6Y

#Pwn

Rowhammer attacks explained simply

Explication simple des attaques Rowhammer

https://www.youtube.com/watch?v=rGaF15-ko5w

#Pwn

Temple Of Pwn 12 - Ret2DlResolve

Vidéo sur le Temple Of Pwn 12 - Ret2DlResolve

https://www.youtube.com/watch?v=6qMabyX0yPw

#Pwn

Heap BINARY EXPLOITATION w/ Matt E!

Vidéo sur l'exploitation binaire de heap avec Matt E!

https://www.youtube.com/watch?v=Im1SqwOVsEQ

#Pwn

Intro to Heap Exploitation

Introduction à l'exploitation de heap

https://www.youtube.com/watch?v=nnF4Avttbns

#Pwn

Binary exploitation : The raiders of the lost chunk - Thomas DUBIER

Exploitation binaire : Les raiders du chunk perdu par Thomas DUBIER

https://www.youtube.com/watch?v=zcLQ4YrgfNQ

#Pwn

Race Conditions and Time of Check to Time of Use TOCTTOU Vulnerabil...

Conditions de course et vulnérabilité Time of Check to Time of Use (TOCTTOU)

https://www.youtube.com/watch?v=PH73lpG2B1M

#Pwn

Heap Exploitation

Exploitation de heap

https://www.youtube.com/watch?v=A-Qf_Q_AeFw

#Pwn

Using Seccomp to Limit the Kernel Attack Surface - Michael Kerrisk

Utilisation de Seccomp pour limiter la surface d'attaque du noyau

https://www.youtube.com/watch?v=q6n4Q3lgjSA

#Pwn

Qu'est ce que le ROP (Return Oriented Programming) ?

Explication sur le ROP (Return Oriented Programming)

https://www.youtube.com/watch?v=zRI8diZTEB0

#Pwn

Exploitation binaire - Heap-Based Partie 2 - Double free

Exploitation binaire - Heap-Based Partie 2 - Double free

https://www.youtube.com/watch?v=NTSiUtzbWQs

#Pwn

Buffer Overflows Part 5 - Heap Overflow Basics

Introduction aux bases du dépassement de tampon de heap

https://www.youtube.com/watch?v=LsA-bYhPS6s

#Pwn

Billy Ellis

Chaîne de Billy Ellis

https://www.youtube.com/c/BillyEllis/videos

#Pwn

Stack Frames (System V AMD64 ABI)

Cadres de pile (System V AMD64 ABI)

https://www.youtube.com/watch?v=JO6GkjJvkTk

#Pwn

My little pwnie | Découverte de pwntools - switch & masterfox

Découverte de pwntools avec switch & masterfox

https://www.youtube.com/watch?v=y5gsiVjfPHg

#Pwn

Glibc Heap Exploitation for fun and profit

Exploitation de heap Glibc pour le plaisir et le profit

https://www.youtube.com/watch?v=U7EwhCQBRZM

#Pwn

[Live] A basic Heap Feng Shui intro - 33c3ctf babyfengshui (pwn 150)

Introduction basique à Heap Feng Shui

https://www.youtube.com/watch?v=zWgS6fTw4Ts

#Pwn

Pwn - Binary exploitation

Exploitation binaire Pwn

https://www.youtube.com/playlist?list=PL1-BhNrIYWnm3HK-8PBL-qhHwWjI-mjb8

#Pwn

1, 2, 3, PWNED ! - Louka Jacques-Chevallier

1, 2, 3, PWNED ! par Louka Jacques-Chevallier

https://www.youtube.com/watch?v=hmt8M9YLwTg

#Pwn

Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges

Exploitation de la faille DRAM Rowhammer pour obtenir des privilèges noyau

https://www.youtube.com/watch?v=0U7511Fb4to

#Pwn

Finding Buffer Overflow with Fuzzing

Trouver le dépassement de tampon avec le fuzzing

https://www.youtube.com/watch?v=Do1Ri8TCF0Q

#Pwn

François Boisson : Buffer Overflow ou explication de «une faille d...

François Boisson : Buffer Overflow ou explication de «une faille d...

https://www.youtube.com/watch?v=u-OZQkv2ebw&start=1s

#Pwn

Exploitation binaire - Buffer overflow Heap Based partie 1

Exploitation binaire - Buffer overflow Heap Based partie 1

https://www.youtube.com/watch?v=PFqEKkj7wWs

#Pwn

Information & Systems Security Society

Société de sécurité de l'information et des systèmes

https://youtube.com/channel/UCofdfNbVHmhmYhSQriJhLag

#Pwn

37C3 - Operation Triangulation: What You Get When Attack iPhones o...

37C3 - Operation Triangulation: What You Get When Attack iPhones o...

https://www.youtube.com/watch?v=1f6YyH62jFE

#Pwn

The Heap: what does malloc() do? - bin 0x14

The Heap: what does malloc() do? - bin 0x14

https://www.youtube.com/watch?v=HPDBOhiKaD8

#Pwn

HEXACON2022 - Life and death of an iOS attacker by Luca Todesco

HEXACON2022 - Life and death of an iOS attacker by Luca Todesco

https://www.youtube.com/watch?v=8mQAYeozl5I

#Pwn

Blind Buffer Overflow exploitation to leak secret data - rhme2 Anim...

Blind Buffer Overflow exploitation to leak secret data - rhme2 Anim...

https://www.youtube.com/watch?v=SstD1O4_kwc

#Pwn

Row Hammer: Flipping Bits in Memory Without Accessing Them - Papers...

Flipping Bits in Memory Without Accessing Them - Papers...

https://www.youtube.com/watch?v=1iBpLhFN_OA

#Pwn

The Heap: How do use-after-free exploits work? - bin 0x16

How do use-after-free exploits work? - bin 0x16

https://www.youtube.com/watch?v=ZHghwsTRyzQ

#Pwn

28c3: String Oriented Programming

String Oriented Programming

https://www.youtube.com/watch?v=DvtBCSYwTiA

#Pwn

[FCSC 2021 - Blind Date] Write Up - Blind rop

Write Up - Blind rop

https://www.youtube.com/watch?v=pGOGITkVzuM

#Pwn

Kernel Exploitation

Kernel Exploitation

https://www.youtube.com/watch?v=HtdriW7KVNE

#Pwn

Qu'est ce que le Heap Spray ?

Qu'est ce que le Heap Spray ?

https://www.youtube.com/watch?v=woKGxIrKFBc

#Pwn

Hacking Livestream #25: Blind ROP

Hacking Livestream #25: Blind ROP

https://www.youtube.com/watch?v=OAk23u9b-88

#Pwn

Reverse Engineering #0 - Reverse un programme (cracking dynamique a...

Reverse Engineering #0 - Reverse un programme (cracking dynamique a...

https://www.youtube.com/watch?v=kyq4V3UtA5w

#Pwn

Pwn - Bypass NX/ASLR via leak de la libc

Bypass NX/ASLR via leak de la libc

https://www.youtube.com/watch?v=8skdPGCEuxE

#Pwn

Browser Exploitation

Browser Exploitation

https://youtube.com/playlist?list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t

#Pwn

Browser Exploitation - Max Zinkus

Browser Exploitation - Max Zinkus

https://www.youtube.com/watch?v=3szZpS58Dqg

#Pwn

OCR with Tesseract - NanoNets Blog

OCR with Tesseract - NanoNets Blog

https://nanonets.com/blog/ocr-with-tesseract/

#Pwn

Docker Remove Cheatsheet

Docker Remove Cheatsheet

https://shisho.dev/blog/posts/docker-remove-cheatsheet/

#Pwn

Go Runtime Hacking

Go Runtime Hacking

https://github.com/golang/go/blob/master/src/runtime/HACKING.md

#Pwn

C/C++ Les Thread - Ocamil

C/C++ Les Thread - Ocamil

https://ocamil.com/index.php/c-c/c-c-les-thread

#Pwn

AI For Beginners - Microsoft

AI For Beginners - Microsoft

https://github.com/microsoft/AI-For-Beginners

#Pwn

Nouvelle Méthode Calcul Matriciel - Trust My Science

Nouvelle Méthode Calcul Matriciel - Trust My Science

https://trustmyscience.com/intelligence-artificielle-nouvelle-methode-calcul-matriciel-acceleration-ordinateurs/

#Pwn

Auteur Moles - Trust My Science

Auteur Moles - Trust My Science

https://trustmyscience.com/author/moles/

#Pwn

Python Regex - W3Schools

Python Regex - W3Schools

https://www.w3schools.com/python/python_regex.asp

#Pwn

Introduction to Machine Learning - Ahampriyanshu

Introduction to Machine Learning - Ahampriyanshu

https://ahampriyanshu.com/blog/intro-to-ml-part-1-introduction/

#Pwn

The Algorithms

The Algorithms

https://github.com/TheAlgorithms

#Pwn

betterTUI

betterTUI

https://pypi.org/project/betterTUI/

#Pwn

Memory Management in Python

Memory Management in Python

https://towardsdatascience.com/memory-management-and-garbage-collection-in-python-c1cb51d1612c

#Pwn

Z3 Playground

Z3 Playground

https://github.com/0vercl0k/z3-playground

#Pwn

CryptoZombies

CryptoZombies

https://cryptozombies.io/en/course/

#Pwn

Martin Heinz Blog

Martin Heinz Blog

https://martinheinz.dev/blog/24

#Pwn

JSON Crack

JSON Crack

https://jsoncrack.com/

#Pwn

Intro to C for Windows Devs

Intro to C for Windows Devs

https://www.sans.org/webcasts/intro-c-windows-devs/

#Pwn

LIEF Project

LIEF Project

https://github.com/lief-project/LIEF

#Pwn

Writing a Windows Fuzzer from Scratch

Writing a Windows Fuzzer from Scratch

https://www.legacyy.xyz/vr/windows/2023/10/23/writing-a-windows-fuzzer-from-scratch.html

#Pwn

Graph NoSQL - Neo4j

Graph NoSQL - Neo4j

https://www.infoq.com/fr/articles/graph-nosql-neo4j/

#Pwn

Neo4j Aura Graph Database

Neo4j Aura Graph Database

https://neo4j.com/cloud/platform/aura-graph-database/?ref=nav-get-started-cta

#Pwn

Raspberry Pi OS Tutorials

Raspberry Pi OS Tutorials

https://github.com/rust-embedded/rust-raspberrypi-OS-tutorials

#Pwn

Binary Tree - Wikipedia FR

Binary Tree - Wikipedia FR

https://fr.wikipedia.org/wiki/Arbre_binaire

#Pwn

Awesome Rust

Awesome Rust

https://github.com/rust-unofficial/awesome-rust

#Pwn

Write a C Interpreter

Write a C Interpreter

https://github.com/lotabout/write-a-C-interpreter/tree/master/tutorial/en

#Pwn

Compilers: Principles, Techniques, and Tools

Compilers: Principles, Techniques, and Tools

https://www.amazon.com/Compilers-Principles-Techniques-Tools-2nd/dp/0321486811

#Pwn

Bell Labs - Wikipedia FR

Bell Labs - Wikipedia FR

https://fr.wikipedia.org/wiki/Laboratoires_Bell

#Pwn

SigmaJS

SigmaJS

https://www.sigmajs.org/

#Pwn

Learn C

Learn C

https://www.learn-c.org/

#Pwn

Docker Update Container on Code Change

Docker Update Container on Code Change

https://stackoverflow.com/questions/63279765/docker-how-to-update-your-container-when-your-code-changes

#Pwn

Unreal Engine C++ Quick Start

Unreal Engine C++ Quick Start

https://docs.unrealengine.com/5.3/en-US/unreal-engine-cpp-quick-start/

#Pwn

Subtyping in C23

Subtyping in C23

https://okmij.org/ftp/Computation/Subtyping/

#Pwn

C23: A Slightly Better C

C23: A Slightly Better C

https://lemire.me/blog/2024/01/21/c23-a-slightly-better-c/

#Pwn

Author: Daniel Lemire

Author: Daniel Lemire

https://lemire.me/blog/author/lemire/

#Pwn

LVGL Monthly Newsletter

LVGL Monthly Newsletter

https://blog.lvgl.io/2024-01-23/monthly-newsletter

#Pwn

You Probably Don't Need to Learn C

You Probably Don't Need to Learn C

https://nedbatchelder.com/blog/202401/you_probably_dont_need_to_learn_c.html

#Pwn

SpaceVim

SpaceVim

https://spacevim.org/

#Pwn

Astronvim

Astronvim

https://astronvim.com/

#Pwn

Lord of the Ring0 Part 1

Lord of the Ring0 Part 1

https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html

#Pwn

Slint

Slint

https://slint.dev/

#Pwn

Z3 Guide - Microsoft

Z3 Guide - Microsoft

https://microsoft.github.io/z3guide/

#Pwn

How do use-after-free exploits work? - bin 0x16

How do use-after-free exploits work? - bin 0x16

https://www.youtube.com/watch?v=ZHghwsTRyzQ

#Pwn

The Heap: How does malloc() work? - bin 0x14

The Heap: How does malloc() work? - bin 0x14

https://www.youtube.com/watch?v=HPDBOhiKaD8

#Pwn

Optimize Python

Optimize Python - Lightender Blog

https://blog.lightender.fr/articles/optimizePython

#Pwn

BROP-102 - Oddcoder

BROP-102 - Oddcoder

https://oddcoder.com/BROP-102/

#Pwn

Guy in a Tuxedo

Guy in a Tuxedo

https://guyinatuxedo.github.io/index.html

#Pwn

Null Byte Poisoning - 0x00sec

Null Byte Poisoning - 0x00sec

https://0x00sec.org/t/null-byte-poisoning-the-magic-byte/3874

#Pwn

Signal Oriented Programming - Development

Signal Oriented Programming - Development

https://devel0pment.de/?p=688

#Pwn

Author 1 - Development

Author 1 - Development

https://devel0pment.de/?author=1

#Pwn

Pwn College

Pwn College

https://pwn.college/

#Pwn

Pwn Adventure

Pwn Adventure

https://www.pwnadventure.com/

#Pwn

ROPemporium

ROPemporium

https://github.com/0xSoEasY/ROPemporium

#Pwn

Finding Badchars

Finding Badchars

https://github.com/Snifer/Finding-Badchars/

#Pwn

Zero to Hero

Zero to Hero

https://r4j.dev/zero-to-hero.html

#Pwn

The Heap: How do use-after-free exploits work? - bin 0x16

The Heap: How do use-after-free exploits work? - bin 0x16

https://www.youtube.com/watch?v=ZHghwsTRyzQ

#Pwn

Browser Exploitation

Browser Exploitation

https://www.youtube.com/watch?v=HPDBOhiKaD8

#Pwn

Introduction to the Heap

Introduction to the Heap - Ir0nstone

https://ir0nstone.gitbook.io/notes/types/heap/introduction-to-the-heap

#Pwn

Heap-Based Buffer Overflow

Heap-Based Buffer Overflow

https://www.0x0ff.info/2014/heap-based-buffer-overflow/

#Pwn

Linux Heap Exploitation - Sensepost

Linux Heap Exploitation - Sensepost

https://sensepost.com/blog/2018/linux-heap-exploitation-intro-series-set-you-free-part-1/

#Pwn

Signal Oriented Programming - Development

Signal Oriented Programming - Development

https://devel0pment.de/?p=688

#Pwn

Author 1 - Development

Author 1 - Development

https://devel0pment.de/?author=1

#Pwn

Return-Oriented Programming (ROP) - InfoSecFrench

Return-Oriented Programming (ROP) - InfoSecFrench

https://www.youtube.com/watch?v=Do1Ri8TCF0Q

#Pwn

Linux Heap Exploitation

Linux Heap Exploitation

https://courseupload.com/linux-heap-exploitation-200321/

#Pwn

Sypro - Courseupload

Sypro - Courseupload

https://courseupload.com/author/sypro/

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

How to Heap

How to Heap

http://blog.fxiao.me/how-to-heap/

#Pwn

PicoCTF 2019 Heap Challenges

PicoCTF 2019 Heap Challenges

https://faraz.faith/2019-10-12-picoctf-2019-heap-challs/

#Pwn

Signal-Oriented Programming - Stormshield

Signal-Oriented Programming - Stormshield

https://thisissecurity.stormshield.com/2015/01/03/playing-with-signals-an-overview-on-sigreturn-oriented-programming/

#Pwn

Mehdi Talbi - Stormshield

Mehdi Talbi - Stormshield

https://thisissecurity.stormshield.com/author/mehditalbi/

#Pwn

Awesome Browser Exploit

Awesome Browser Exploit

https://github.com/Escapingbug/awesome-browser-exploit

#Pwn

Browser Exploitation

Browser Exploitation

https://www.youtube.com/watch?v=nnF4Avttbns

#Pwn

Binary Exploitation - Welchbj

Binary Exploitation - Welchbj

https://github.com/welchbj/ctf/blob/master/docs/binary-exploitation.md

#Pwn

Linux/Unix Privilege Escalation - HackTricks

Linux/Unix Privilege Escalation - HackTricks

https://book.hacktricks.xyz/linux-unix/privilege-escalation/seccomp

#Pwn

Google Project Zero

Google Project Zero

https://googleprojectzero.blogspot.com/

#Pwn

Getting into Browser Exploitation

Getting into Browser Exploitation

https://liveoverflow.com/getting-into-browser-exploitation-new-series-introduction-browser-0x00/

#Pwn

Shellcoding Cheatsheet - Sec4Us

Shellcoding Cheatsheet - Sec4Us

https://sec4us.com.br/cheatsheet/shellcoding

#Pwn

PBCTF 2021 Nightclub Writeup

PBCTF 2021 Nightclub Writeup

https://www.willsroot.io/2021/10/pbctf-2021-nightclub-writeup-more-fun.html

#Pwn

FILE Structure Exploitation

FILE Structure Exploitation - Perfect Blue Blog

https://blog.perfect.blue/FILE-Structure-Exploitation/

#Pwn

Browser Exploitation

Browser Exploitation - Connor McGarr

https://connormcgarr.github.io/browser1/

#Pwn

HackSys Extreme Vulnerable Driver

HackSys Extreme Vulnerable Driver - GitHub

https://github.com/hacksysteam/HackSysExtremeVulnerableDriver

#Pwn

Corelan

Corelan

https://www.corelan.be/

#Pwn

Memory Corruption

Memory Corruption - HackMD

https://hackmd.io/@express/HkXgZJFe9

#Pwn

Stack Buffer Overflow

Stack Buffer Overflow - HackMD

https://hackmd.io/DTa_wd3aSo2WDXrFfLyuDg

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

ROP Exploitation

ROP Exploitation - HackMD

https://hackmd.io/ShdZvRpwROO6NRuNGe2phA?view

#Pwn

Buffer Overflow Guide

Buffer Overflow Guide - Alomancy

https://alomancy.gitbook.io/guides/guides/bof

#Pwn

Stack Buffer Overflow - Complete Guide

Complete Guide to Stack Buffer Overflow - Steflan Security

https://steflan-security.com/complete-guide-to-stack-buffer-overflow-oscp/

#Pwn

Stefano Lanaro

Stefano Lanaro - Steflan Security

https://steflan-security.com/author/stefano-lanaro96/

#Pwn

Heap Exploitation Video

Heap Exploitation Video - Tenor

https://media.tenor.co/videos/52d59aa7bbbb13d7e964f0267c618fb8/mp4

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

Browser Exploitation Video

Browser Exploitation Video

https://www.youtube.com/watch?v=kyq4V3UtA5w

#Pwn

Browser Exploitation Channel

Browser Exploitation Channel - InfoSec

https://www.youtube.com/channel/UC7iUQz7WRKyJFn6p51tJwfQ

#Pwn

x86 Assembly

x86 Assembly - C9X

https://c9x.me/x86/

#Pwn

RET2 Blog

RET2 Blog - ret2.io

https://blog.ret2.io/

#Pwn

ret2dl_resolve

ret2dl_resolve - Syst3mFailure

https://syst3mfailure.io/ret2dl_resolve

#Pwn

Understanding GLIBC Malloc

Understanding GLIBC Malloc - SploitFun

https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/

#Pwn

Hacking Book

Hacking Book - No Starch Press

https://nostarch.com/hacking2.htm

#Pwn

Race Condition

Race Condition - Veracode

https://www.veracode.com/security/race-condition

#Pwn

Write-Ups

Write-Ups - nobodyisnobody

https://github.com/nobodyisnobody/write-ups

#Pwn

Safe Linking Mitigation

Safe Linking Mitigation - Research Innovations

https://www.researchinnovations.com/post/bypassing-the-upcoming-safe-linking-mitigation

#Pwn

Tweet - Podalirius

Tweet - Podalirius

https://twitter.com/podalirius_/status/1433367842582405122

#Pwn

Twitter - Podalirius

Twitter - Podalirius

https://twitter.com/podalirius_

#Pwn

Null Pointer Bypass

Null Pointer Bypass - cr0 Blog

https://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html

#Pwn

NES Console Writing

NES Console Writing - Copetti

https://www.copetti.org/writings/consoles/nes/

#Pwn

Console Writings

Console Writings - Copetti

https://www.copetti.org/writings/consoles/

#Pwn

Dropping SUID Rights in Shellcodes

Dropping SUID Rights in Shellcodes - Podalirius

https://podalirius.net/fr/articles/unix-shells-dropping-suid-rights-in-shellcodes/

#Pwn

Writing Your First Shellcode

Writing Your First Shellcode - Zeste de Savoir

https://zestedesavoir.com/articles/158/ecrivez-votre-premier-shellcode-en-asm-x86/

#Pwn

SMEP Bypass Techniques

SMEP Bypass Techniques - Vitaly Nikolenko

https://fr.slideshare.net/VitalyNikolenko/linux-smep-bypass-techniques

#Pwn

Modern Binary Exploitation

Modern Binary Exploitation - RPISEC

https://github.com/RPISEC/MBE

#Pwn

Hardened Flag Store

Hardened Flag Store - Bruce30262

https://bruce30262.github.io/hxp-CTF-2017-hardened-flag-store/

#Pwn

Linux/Unix Privilege Escalation

Linux/Unix Privilege Escalation - HackTricks

https://book.hacktricks.xyz/linux-unix/privilege-escalation/seccomp

#Pwn

ROPing on Aarch64

ROPing on Aarch64 - Perfect Blue Blog

https://blog.perfect.blue/ROPing-on-Aarch64

#Pwn

FILE Structure Exploitation

FILE Structure Exploitation - Dhaval Kapil

https://dhavalkapil.com/blogs/FILE-Structure-Exploitation/

#Pwn

Tweet - CyberWarship

Tweet - CyberWarship

https://twitter.com/CyberWarship/status/1455545245513527298/photo/1

#Pwn

FILE Structure Exploitation

FILE Structure Exploitation - Perfect Blue Blog

https://blog.perfect.blue/FILE-Structure-Exploitation/

#Pwn

Browser Exploitation

Browser Exploitation - Connor McGarr

https://connormcgarr.github.io/browser1/

#Pwn

HackSys Extreme Vulnerable Driver

HackSys Extreme Vulnerable Driver - GitHub

https://github.com/hacksysteam/HackSysExtremeVulnerableDriver

#Pwn

Corelan

Corelan

https://www.corelan.be/

#Pwn

Memory Corruption

Memory Corruption - HackMD

https://hackmd.io/@express/HkXgZJFe9

#Pwn

Stack Buffer Overflow

Stack Buffer Overflow - HackMD

https://hackmd.io/DTa_wd3aSo2WDXrFfLyuDg

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

ROP Exploitation

ROP Exploitation - HackMD

https://hackmd.io/ShdZvRpwROO6NRuNGe2phA?view

#Pwn

Buffer Overflow Guide

Buffer Overflow Guide - Alomancy

https://alomancy.gitbook.io/guides/guides/bof

#Pwn

Stack Buffer Overflow - Complete Guide

Complete Guide to Stack Buffer Overflow - Steflan Security

https://steflan-security.com/complete-guide-to-stack-buffer-overflow-oscp/

#Pwn

Stefano Lanaro

Stefano Lanaro - Steflan Security

https://steflan-security.com/author/stefano-lanaro96/

#Pwn

Heap Exploitation Video

Heap Exploitation Video - Tenor

https://media.tenor.co/videos/52d59aa7bbbb13d7e964f0267c618fb8/mp4

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

Browser Exploitation Video

Browser Exploitation Video

https://www.youtube.com/watch?v=kyq4V3UtA5w

#Pwn

Browser Exploitation Channel

Browser Exploitation Channel - InfoSec

https://www.youtube.com/channel/UC7iUQz7WRKyJFn6p51tJwfQ

#Pwn

x86 Assembly

x86 Assembly - C9X

https://c9x.me/x86/

#Pwn

RET2 Blog

RET2 Blog - ret2.io

https://blog.ret2.io/

#Pwn

ret2dl_resolve

ret2dl_resolve - Syst3mFailure

https://syst3mfailure.io/ret2dl_resolve

#Pwn

Understanding GLIBC Malloc

Understanding GLIBC Malloc - SploitFun

https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/

#Pwn

Hacking Book

Hacking Book - No Starch Press

https://nostarch.com/hacking2.htm

#Pwn

Race Condition

Race Condition - Veracode

https://www.veracode.com/security/race-condition

#Pwn

Write-Ups

Write-Ups - nobodyisnobody

https://github.com/nobodyisnobody/write-ups

#Pwn

Safe Linking Mitigation

Safe Linking Mitigation - Research Innovations

https://www.researchinnovations.com/post/bypassing-the-upcoming-safe-linking-mitigation

#Pwn

Tweet - Podalirius

Tweet - Podalirius

https://twitter.com/podalirius_/status/1433367842582405122

#Pwn

Twitter - Podalirius

Twitter - Podalirius

https://twitter.com/podalirius_

#Pwn

Null Pointer Bypass

Null Pointer Bypass - cr0 Blog

https://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html

#Pwn

NES Console Writing

NES Console Writing - Copetti

https://www.copetti.org/writings/consoles/nes/

#Pwn

Console Writings

Console Writings - Copetti

https://www.copetti.org/writings/consoles/

#Pwn

Dropping SUID Rights in Shellcodes

Dropping SUID Rights in Shellcodes - Podalirius

https://podalirius.net/fr/articles/unix-shells-dropping-suid-rights-in-shellcodes/

#Pwn

Writing Your First Shellcode

Writing Your First Shellcode - Zeste de Savoir

https://zestedesavoir.com/articles/158/ecrivez-votre-premier-shellcode-en-asm-x86/

#Pwn

SMEP Bypass Techniques

SMEP Bypass Techniques - Vitaly Nikolenko

https://fr.slideshare.net/VitalyNikolenko/linux-smep-bypass-techniques

#Pwn

Modern Binary Exploitation

Modern Binary Exploitation - RPISEC

https://github.com/RPISEC/MBE

#Pwn

Hardened Flag Store

Hardened Flag Store - Bruce30262

https://bruce30262.github.io/hxp-CTF-2017-hardened-flag-store/

#Pwn

Linux/Unix Privilege Escalation

Linux/Unix Privilege Escalation - HackTricks

https://book.hacktricks.xyz/linux-unix/privilege-escalation/seccomp

#Pwn

ROPing on Aarch64

ROPing on Aarch64 - Perfect Blue Blog

https://blog.perfect.blue/ROPing-on-Aarch64

#Pwn

FILE Structure Exploitation

FILE Structure Exploitation - Dhaval Kapil

https://dhavalkapil.com/blogs/FILE-Structure-Exploitation/

#Pwn

Tweet - CyberWarship

Tweet - CyberWarship

https://twitter.com/CyberWarship/status/1455545245513527298/photo/1

#Pwn

Kernel Setup

Kernel Setup - Rootkits

https://rootkits.xyz/blog/2017/06/kernel-setting-up/

#Pwn

Linux Kernel Pwn Basics

Linux Kernel Pwn Basics - MEM2019

https://mem2019.github.io/jekyll/update/2019/01/11/Linux-Kernel-Pwn-Basics.html

#Pwn

ROPUTILS

ROPUTILS - inaz2

https://github.com/inaz2/roputils/

#Pwn

CCSC 2021 Writeups

CCSC 2021 Writeups - Csotiriou

https://blog.csotiriou.com/post/ccsc-2021-writeups/

#Pwn

Thalium Blog

Thalium Blog

https://thalium.github.io/blog/

#Pwn

Format String Attack

Format String Attack - OWASP

https://owasp.org/www-community/attacks/Format_string_attack

#Pwn

Exploit Papers

Exploit Papers - Exploit-DB

https://www.exploit-db.com/papers/23985

#Pwn

Exploiting DRAM Rowhammer Bug

Exploiting DRAM Rowhammer Bug - Google Project Zero

https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html

#Pwn

Rowhammer Overview

Rowhammer Overview - Daily Security

https://www.dailysecurity.fr/rowhammer/

#Pwn

Rampage Attack Explained

Rampage Attack Explained - Cyber.tn

https://cyber.tn/rampage-attack-explained-exploiting-rowhammer-on-android-again/

#Pwn

Rowhammering

Rowhammering - Hammertux

https://github.com/hammertux/rowhammering

#Pwn

FCSC 2020 Writeups

FCSC 2020 Writeups - GW3L

https://github.com/gw3l/FCSC-2020-Writeups/blob/master/HelloRootkitty.md

#Pwn

Write-Ups

Write-Ups - nobodyisnobody

https://github.com/nobodyisnobody/write-ups

#Pwn

Exploit Mitigations Disabled

Exploit Mitigations Disabled - red0xff

https://red0xff.github.io/posts/when_exploit_mitigations_are_disabled_on_modern_systems/

#Pwn

Hello Rootkitty

Hello Rootkitty - Hug0 Vincent

https://hug0vincent.github.io/2020/05/hello-rootkitty/

#Pwn

Sandsifter

Sandsifter - xoreaxeaxeax

https://github.com/xoreaxeaxeax/sandsifter

#Pwn

Seccomp Tools

Seccomp Tools - david942j

https://github.com/david942j/seccomp-tools

#Pwn

TokyoWesterns CTF 2018

TokyoWesterns CTF 2018 Write-Up - david942j

https://david942j.blogspot.com/2018/09/write-up-tokyowesterns-ctf-2018.html

#Pwn

Exploit Courses

Exploit Courses

https://exploit.courses/

#Pwn

Linux Kernel Exploitation

Linux Kernel Exploitation - xairy

https://github.com/xairy/linux-kernel-exploitation

#Pwn

Exploitation Video

Exploitation Video

https://www.youtube.com/watch?v=y5gsiVjfPHg

#Pwn

ROPStar

ROPStar - XCT

https://github.com/xct/ropstar

#Pwn

Azeria Labs Cheatsheet

Azeria Labs Cheatsheet

https://azeria-labs.com/downloads/cheatsheetv1.1-1920x1080.png

#Pwn

Nightmare

Nightmare - Guy in a Tuxedo

https://github.com/guyinatuxedo/nightmare

#Pwn

Ret2ZP

Ret2ZP - Attify Blog

https://blog.attify.com/demystifying-ret2zp/

#Pwn

Windows Memory Corruption Exploits Part I

Windows Memory Corruption Exploits Part I - CyberArk

https://www.cyberark.com/resources/threat-research-blog/a-modern-exploration-of-windows-memory-corruption-exploits-part-i-stack-overflows

#Pwn

Fuzzy Security Tutorials

Fuzzy Security Tutorials

https://www.fuzzysecurity.com/tutorials.html

#Pwn

Linux Kernel Pwn

Linux Kernel Pwn - Efiens Blog

https://blog.efiens.com/post/midas/linux-kernel-pwn-modprobe/

#Pwn

Exploitation Video

Exploitation Video

https://www.youtube.com/watch?v=Gu_5kkErQ6Y

#Pwn

Exploitation Video

Exploitation Video

https://www.youtube.com/watch?v=eF-nJnPycXs

#Pwn

Binary Function Analysis

Binary Function Analysis - Quarkslab

https://blog.quarkslab.com/weisfeiler-lehman-graph-kernel-for-binary-function-analysis.html

#Pwn

UAF Mitigation and Bypass

UAF Mitigation and Bypass - Yumpu

https://www.yumpu.com/en/document/read/35526819/demott-uaf-migitation-and-bypass/64

#Pwn

Vergilius Project

Vergilius Project

https://www.vergiliusproject.com/

#Pwn

Browser Exploitation

Browser Exploitation - Connor McGarr

https://connormcgarr.github.io/browser1/

#Pwn

HackSys Extreme Vulnerable Driver

HackSys Extreme Vulnerable Driver - GitHub

https://github.com/hacksysteam/HackSysExtremeVulnerableDriver

#Pwn

Corelan

Corelan

https://www.corelan.be/

#Pwn

Memory Corruption

Memory Corruption - HackMD

https://hackmd.io/@express/HkXgZJFe9

#Pwn

Heap Exploitation

Heap Exploitation

https://heap-exploitation.dhavalkapil.com/

#Pwn

ROP Exploitation

ROP Exploitation - HackMD

https://hackmd.io/ShdZvRpwROO6NRuNGe2phA?view

#Pwn

Buffer Overflow Guide

Buffer Overflow Guide - Alomancy

https://alomancy.gitbook.io/guides/guides/bof

#Pwn

Stack Buffer Overflow - Complete Guide

Complete Guide to Stack Buffer Overflow - Steflan Security

https://steflan-security.com/complete-guide-to-stack-buffer-overflow-oscp/

#Pwn

Archives

Archives - Etenal.me

https://etenal.me/archives/1825

#Pwn

Splitmind

Splitmind - Jerdna Regeiz

https://github.com/jerdna-regeiz/splitmind

#Pwn

Linux Insides Theory

Linux Insides Theory - 0xAX

https://0xax.gitbooks.io/linux-insides/content/Theory/linux-theory-1.html

#Pwn

GDB Debugging Guide

GDB Debugging Guide - anvbis

https://gist.github.com/anvbis/64907e4f90974c4bdd930baeb705dedf

#Pwn

Rappel

Rappel - YRP604

https://github.com/yrp604/rappel

#Pwn

Source Engine RCE

Source Engine RCE - Secret Club

https://secret.club/2021/05/13/source-engine-rce-join.html

#Pwn

Linux Insides Theory

Linux Insides Theory - 0xAX

https://0xax.gitbooks.io/linux-insides/content/Theory/linux-theory-1.html

#Pwn

Decomp2Dbg

Decomp2Dbg - Mahaloz

https://github.com/mahaloz/decomp2dbg

#Pwn

TempleOfPwn Exploit

TempleOfPwn Exploit - GitHub

https://github.com/LMS57/TempleOfPwn/blob/main/fsop/exploit.py

#Pwn

Format Strings GOT Overwrite

Format Strings GOT Overwrite - Ret2ROP Blog

https://ret2rop.blogspot.com/2018/10/format-strings-got-overwrite-remote.html?m=1

#Pwn

RP Tool

RP Tool - GitHub

https://github.com/0vercl0k/rp

#Pwn

Exploitation Stack Buffer Overflow

Exploitation Stack Buffer Overflow - Zenika Blog

https://blog.zenika.com/2021/02/22/exploitation-stack-buffer-overflow-blind-return-oriented-programming/amp/

#Pwn

Pwn Adventure

Pwn Adventure

https://www.pwnadventure.com/

#Pwn

Memory Corruption Without Corruption

Memory Corruption Without Corruption - GitHub Blog

https://github.blog/2022-07-27-corrupting-memory-without-memory-corruption/

#Pwn

SLUB Refresher

SLUB Refresher - Paolo Monti

https://github.com/PaoloMonti42/salt/blob/master/docs/0x00_SLUB_refresher.md

#Pwn

Heap Overflow Study

Heap Overflow Study - Samsung KSPP

https://samsung.github.io/kspp-study/heap-ovfl.html

#Pwn

Pwn Browser

Pwn Browser

https://pwn.browser.rip/

#Pwn

Exploit Development

Exploit Development - Devel0pment

https://devel0pment.de/?p=688

#Pwn

CTF Writeup

CTF Writeup - CTFtime

https://ctftime.org/writeup/34827

#Pwn

Braindead Buffer Overflow Guide

Braindead Buffer Overflow Guide - Boschko

https://boschko.ca/braindead-buffer-overflow-guide-to-pass-the-oscp-blindfolded/

#Pwn

Linux Kernel Exploitation CTF

Linux Kernel Exploitation CTF - 0x434b

https://0x434b.dev/dabbling-with-linux-kernel-exploitation-ctf-challenges-to-learn

#Pwn

FCSC 2022 Writeup

FCSC 2022 Writeup - Voydstack

https://github.com/voydstack/FCSC2022/blob/main/pwn/formatage/README.md

#Pwn

Learning Browser Exploitation

Learning Browser Exploitation - Bruce30262

https://bruce30262.github.io/Learning-browser-exploitation-via-33C3-CTF-feuerfuchs-challenge/

#Pwn

Paracosme

Paracosme - 0vercl0k

https://github.com/0vercl0k/paracosme

#Pwn

Villoc

Villoc - GitHub

https://github.com/wapiflapi/villoc

#Pwn

GEF Extras

GEF Extras - Hugsy

https://github.com/hugsy/gef-extras

#Pwn

Linux Source Scripts

Linux Source Scripts - Elixir

https://elixir.bootlin.com/linux/latest/source/scripts

#Pwn

Linux Kernel Blog

Linux Kernel Blog - Guillaume Gomez

https://blog.guillaume-gomez.fr/Linux-kernel/1/1

#Pwn

StarCTF OOB V8

StarCTF OOB V8 - Faraz Faiz

https://faraz.faith/2019-12-13-starctf-oob-v8-indepth/

#Pwn

LiveOverflow Browser Exploitation

LiveOverflow Browser Exploitation

https://liveoverflow.com/topic/browser-exploitation/

#Pwn

Format String Notes

Format String Notes - ir0nstone

https://github.com/ir0nstone/pwn-notes/blob/master/types/stack/format-string.md

#Pwn

Exploit 101 Format Strings

Exploit 101 Format Strings - Axcheron

https://axcheron.github.io/exploit-101-format-strings/

#Pwn

64marsh Exploit Guide

64marsh Exploit Guide

https://0x64marsh.com/?p=314

#Pwn

64marsh Author Page

64marsh Author Page

https://0x64marsh.com/?author=1

#Pwn

House of Corrosion

House of Corrosion - CptGibbon

https://github.com/CptGibbon/House-of-Corrosion

#Pwn

Return to VDSO

Return to VDSO - Void Security

https://www.voidsecurity.in/2014/12/return-to-vdso-using-elf-auxiliary.html

#Pwn

Windows Kernel Exploitation

Windows Kernel Exploitation - VulnDev

https://vulndev.io/2022/09/24/windows-kernel-exploitation-arbitrary-memory-mapping-x64/

#Pwn

Firefox OOB to RCE

Firefox OOB to RCE - VulnDev

https://vulndev.io/2022/09/09/browser-exploitation-firefox-oob-to-rce/

#Pwn

HEVD Use After Free

HEVD Use After Free - VulnDev

https://vulndev.io/2022/07/14/windows-kernel-exploitation-hevd-x64-use-after-free/

#Pwn

VulnDev

VulnDev

https://vulndev.io/

#Pwn

CS6265 Tutorial

CS6265 Tutorial - Georgia Tech

https://tc.gts3.org/cs6265/2019/tut/tut01-warmup1.html

#Pwn

CTF Wiki ROP

CTF Wiki ROP - Cougar Kim

https://cougar.kim/posts/ctf_wiki_rop/

#Pwn

Chrome Browser Exploitation

Chrome Browser Exploitation - Jhalon

https://jhalon.github.io/chrome-browser-exploitation-1/

#Pwn

WinPwn

WinPwn - Byzero512

https://github.com/Byzero512/winpwn

#Pwn

Guy in a Tuxedo Blog

Guy in a Tuxedo Blog

https://guyinatuxedo.github.io/

#Pwn

Integer Overflow Attack

Integer Overflow Attack - Comparitech

https://www.comparitech.com/blog/information-security/integer-overflow-attack/

#Pwn

FUSE Exploit

FUSE Exploit - Exploiter Blog

http://exploiter.dev/blog/2022/FUSE-exploit.html

#Pwn

House of Gods

House of Gods - Milo-D

https://github.com/Milo-D/house-of-gods

#Pwn

0poss Blog

0poss Blog

https://0poss.github.io/

#Pwn

Zeratool

Zeratool - ChrisTheCoolHut

https://github.com/ChrisTheCoolHut/Zeratool

#Pwn

1Day Dev

1Day Dev

https://1day.dev/

#Pwn

Exploiting C++ VTables

Exploiting C++ VTables - Defuse.ca

https://defuse.ca/exploiting-cpp-vtables.htm

#Pwn

Pwn SCFA

Pwn SCFA - Own2Pwn

http://own2pwn.fr/pwn-scfa

#Pwn

Apocalypse CTF Writeup

Apocalypse CTF Writeup - Dplastico

https://dplastico.github.io/2022/05/25/Apocalypse_ctf.html

#Pwn

Stack Alignment Ubuntu 18.04

Stack Alignment Ubuntu 18.04 - Cameron Wickes

https://www.cameronwickes.co.uk/stack-alignment-ubuntu-18-04-movaps/

#Pwn

HackMD Guide

HackMD Guide - Pepsipu

https://hackmd.io/@pepsipu/ry-SK44pt

#Pwn

Security Insecurity Blog

Security Insecurity Blog

https://securityinsecurity.github.io/

#Pwn

FSOP Lazynote

FSOP Lazynote - Faraz Faiz

https://faraz.faith/2020-10-13-FSOP-lazynote/

#Pwn

Playing with PCI Device Memory

Playing with PCI Device Memory - NixHacker

https://nixhacker.com/playing-with-pci-device-memory/

#Pwn

Exploiting Off-by-One Buffer Overflow

Exploiting Off-by-One Buffer Overflow - NixHacker

https://nixhacker.com/exploiting-off-by-one-buffer-overflow/

#Pwn

SploitFun Blog

SploitFun Blog

https://sploitfun.wordpress.com/

#Pwn

Heap Exploit Intro

Heap Exploit Intro - TyeYeah

https://tyeyeah.github.io/2021/05/12/2021-05-12-Heap-Exploit-Intro/

#Pwn

Linux Kernel Building Exploit Preparation

Linux Kernel Building Exploit Preparation - TyeYeah

https://tyeyeah.github.io/2021/04/20/2021-04-20-Linux-Kernel-Building-Exploit-Preparation/

#Pwn

Heap Exploitation in Real World

Heap Exploitation in Real World - hac425xxx

https://github.com/hac425xxx/heap-exploitation-in-real-world

#Pwn

Angrop Tool

Angrop Tool - Angr

https://github.com/angr/angrop

#Pwn

CTF Wiki User Mode

CTF Wiki User Mode

https://ctf-wiki.org/pwn/linux/user-mode/environment/

#Pwn

Bropper Tool

Bropper Tool - Hakumarachi

https://github.com/Hakumarachi/Bropper

#Pwn

Gadget Sequence for x86_64 ROP

Gadget Sequence for x86_64 ROP - Void Security

https://www.voidsecurity.in/2013/07/some-gadget-sequence-for-x8664-rop.html

#Pwn

Linux Kernel Blog

Linux Kernel Blog - Pawnyable Cafe

https://pawnyable.cafe/linux-kernel/

#Pwn

GIT Rekt

GIT Rekt - Firzen

https://firzen.de/git-rekt-1-siim-ftp

#Pwn

BootHole GitHub

BootHole GitHub - Eclypsium

https://github.com/eclypsium/BootHole

#Pwn

Exploit Development Playlist

Exploit Development Playlist - YouTube

https://www.youtube.com/playlist?list=PL1-BhNrIYWnm3HK-8PBL-qhHwWjI-mjb8

#Pwn

HEVD Kernel Exploit

HEVD Kernel Exploit - MGeeky

https://github.com/mgeeky/HEVD_Kernel_Exploit

#Pwn

HEVD Stackoverflow SMEP Bypass

HEVD Stackoverflow SMEP Bypass - H0mbre

https://h0mbre.github.io/HEVD_Stackoverflow_SMEP_Bypass_64bit/

#Pwn

Pwnable.tw

Pwnable.tw

https://pwnable.tw/

#Pwn

Kernel Exploit Practice

Kernel Exploit Practice - pr0cf5

https://github.com/pr0cf5/kernel-exploit-practice/blob/master/return-to-user/README.md

#Pwn

Linux Kernel Modprobe

Linux Kernel Modprobe - Lkmidas

https://lkmidas.github.io/posts/20210223-linux-kernel-pwn-modprobe/

#Pwn

Exploitation Series

Exploitation Series - Blahcat

https://blahcat.github.io/pages/exploitation-series.html

#Pwn

ARM Exploitation Guide

ARM Exploitation Guide - AD2001

https://ad2001.gitbook.io/a-noobs-guide-to-arm-exploitation/

#Pwn

Abusing Exceptions Part 2

Abusing Exceptions Part 2 - Bill Demirkapi

https://billdemirkapi.me/abusing-exceptions-for-code-execution-part-2/

#Pwn

Echo Exploit

Echo Exploit - Arget

https://arget.cc/2023/01/01/echo

#Pwn

Exploit Development Playlist

Exploit Development Playlist - YouTube

https://www.youtube.com/playlist?list=PL1-BhNrIYWnm3HK-8PBL-qhHwWjI-mjb8

#Pwn

FS Library

FS Library - MiaouPlop

https://github.com/miaouPlop/fs

#Pwn

LibFormatStr

LibFormatStr - Hellman

https://github.com/hellman/libformatstr

#Pwn

Eternal Blog

Eternal Blog

https://etenal.me/archives/1825

#Pwn

Exploitation Series

Exploitation Series - Blahcat

https://blahcat.github.io/pages/exploitation-series.html

#Pwn

Heap Exploitation

Heap Exploitation - Dvorhack

https://github.com/Dvorhack/Heap_exploitation

#Pwn

OpenSSH Pre-Auth Double Free

OpenSSH Pre-Auth Double Free - JFrog

https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/

#Pwn

HTB Playertwo

HTB Playertwo - 0xdf

https://0xdf.gitlab.io/2020/06/27/htb-playertwo.html

#Pwn

Fastbin Attack Tutorial

Fastbin Attack Tutorial - 0x00sec

https://0x00sec.org/t/heap-exploitation-fastbin-attack/3627

#Pwn

ROPing on Aarch64

ROPing on Aarch64 - Perfect Blue

https://blog.perfect.blue/ROPing-on-Aarch64

#Pwn

Linux Kernel Modprobe

Linux Kernel Modprobe - Lkmidas

https://lkmidas.github.io/posts/20210223-linux-kernel-pwn-modprobe/

#Pwn

ROP Bypass NX ASLR PIE Canary

ROP Bypass NX ASLR PIE Canary - IronHackers

https://ironhackers.es/en/tutoriales/pwn-rop-bypass-nx-aslr-pie-y-canary/

#Pwn

Memory Protections Guide

Memory Protections Guide - MDanilor

https://mdanilor.github.io/posts/memory-protections/

#Pwn

ROP ARM32

ROP ARM32 - Azeria Labs

https://azeria-labs.com/return-oriented-programming-arm32/

#Pwn

Nintendo DSi Browser Hack

Nintendo DSi Browser Hack - Farlow

https://farlow.dev/2023/03/02/hacking-the-nintendo-dsi-browser

#Pwn

ARM IoT Exploit Lab

ARM IoT Exploit Lab - Ringzer0

https://www.ringzer0.training/archive/2022-august/arm-iot-exploitlab.html

#Pwn

HackSecureIMS

HackSecureIMS - Lexterl33t

https://github.com/Lexterl33t/hacksecureims/blob/main/README.md

#Pwn

Xarch Shellcode

Xarch Shellcode - Ixty

https://github.com/ixty/xarch_shellcode

#Pwn

One Shellcode to Rule Them All

One Shellcode to Rule Them All - Shane Wilton

https://www.slideshare.net/ShaneWilton/one-shellcode-to-rule-them-all

#Pwn

Heap Viewer

Heap Viewer - Dani Gargu

https://github.com/danigargu/heap-viewer

#Pwn

QEMU iPod Touch

QEMU iPod Touch - Part 2

https://devos50.github.io/blog/2022/ipod-touch-qemu-pt2/

#Pwn

Glibc Heap Exploitation Basics

Glibc Heap Exploitation Basics

http://blog.k3170makan.com/2018/12/glibc-heap-exploitation-basics.html

#Pwn

CSGO Fuzzing BSP

CSGO Fuzzing BSP - Phoenhex

https://phoenhex.re/2018-08-26/csgo-fuzzing-bsp

#Pwn

Ret2ASLR

Ret2ASLR - Google Security Research

https://github.com/google/security-research/tree/master/pocs/cpus/ret2aslr

#Pwn

Honggfuzz

Honggfuzz - Google

https://github.com/google/honggfuzz

#Pwn

Windows 10 NT Heap Exploitation

Windows 10 NT Heap Exploitation - AngelBoy

https://www.slideshare.net/AngelBoy1/windows-10-nt-heap-exploitation-english-version

#Pwn

Linux Kernel Exploit Development

Linux Kernel Exploit Development - Breaking Bits

https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development

#Pwn

Chrome Browser Exploitation

Chrome Browser Exploitation - Jhalon

https://jhalon.github.io/chrome-browser-exploitation-1/

#Pwn

WTF Tool

WTF Tool - 0vercl0k

https://github.com/0vercl0k/wtf

#Pwn

Heepy Tool

Heepy Tool - Novafacing

https://github.com/novafacing/heepy

#Pwn

Payload Injection Management

Managing Inputs for Payload Injection - StackExchange

https://reverseengineering.stackexchange.com/questions/13928/managing-inputs-for-payload-injection

#Pwn

LLEF Tool

LLEF Tool - Foundry Zero

https://github.com/foundryzero/llef

#Pwn

Pwn Adventure 3

Pwn Adventure 3 - Jaiminton

https://www.jaiminton.com/Game-Hacking/Pwn-Adventure-3

#Pwn

Null Dereferences Exploitation

Null Dereferences Exploitation - Google Project Zero

https://googleprojectzero.blogspot.com/2023/01/exploiting-null-dereferences-in-linux.html

#Pwn

IKE Tool

IKE Tool - Mahaloz

https://ike.mahaloz.re/

#Pwn

Attacking JS Engines

Attacking JS Engines - Side Channel Blog

https://www.sidechannel.blog/en/attacking-js-engines/

#Pwn

Chrome Browser Exploitation

Chrome Browser Exploitation - Jhalon

https://jhalon.github.io/chrome-browser-exploitation-1/

#Pwn

Re-enabling FSOP on Libc 2.35

Re-enabling FSOP on Libc 2.35 - Mymaqn

https://github.com/Mymaqn/reenabling_fsop_on_libc2_35

#Pwn

Android Kernel Exploitation

Android Kernel Exploitation - CloudFuzz

https://cloudfuzz.github.io/android-kernel-exploitation/chapters/environment-setup.html

#Pwn

Dimitri Fourny Blog

Dimitri Fourny Blog

https://dimitrifourny.github.io/

#Pwn

Glibc Heap Exploitation Techniques

Glibc Heap Exploitation Techniques - 0x434b

https://0x434b.dev/overview-of-glibc-heap-exploitation-techniques/

#Pwn

GTIRB Stack Stamp

GTIRB Stack Stamp - GrammaTech

https://github.com/GrammaTech/gtirb-stack-stamp

#Pwn

Silifuzz

Silifuzz - Google

https://github.com/google/silifuzz

#Pwn

OpenSecurityTraining Vulns1001

OpenSecurityTraining Vulns1001

https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Vulns1001_C-family+2023_v1/about

#Pwn

VDR Tool

VDR Tool - Takahiro Haruyama

https://github.com/TakahiroHaruyama/VDR

#Pwn

Windows Kernel Wild Copy Exploit

Windows Kernel Wild Copy Exploit - Theori

https://blog.theori.io/exploiting-windows-kernel-wild-copy-with-user-fault-handling-cve-2023-28218-89f5189d0926

#Pwn

House of Rust

House of Rust - C4ebt

https://c4ebt.github.io/2021/01/22/House-of-Rust.html

#Pwn

HackMD Guide

HackMD Guide - Pepsipu

https://hackmd.io/@pepsipu/SyqPbk94a

#Pwn

Far Out Man

Far Out Man - DF Sec

https://blog.dfsec.com/ios/2023/11/19/thats-far-out-man/

#Pwn

Shogun Tool

Shogun Tool - Guy in a Tuxedo

https://github.com/guyinatuxedo/Shogun

#Pwn

0CTF-TCTF 2023 Writeup

0CTF-TCTF 2023 Writeup - Chovid99

https://chovid99.github.io/posts/0ctf-tctf-2023/

#Pwn

Overflow

Overflow - Punkx

https://punkx.org/overflow/

#Pwn

Libc GOT Chain

Libc GOT Chain - ThisUsernameIsTaken

https://github.com/thisusernameistaken/LibcGOTchain

#Pwn

Preeny

Preeny - Zardus

https://github.com/zardus/preeny

#Pwn

RWCTF Writeup

RWCTF Writeup - HackCyom

https://www.hackcyom.com/2024/01/rwctf-lets-party-in-the-house-wu/

#Pwn

Awesome Browser Exploit

Awesome Browser Exploit - EscapingBug

https://github.com/Escapingbug/awesome-browser-exploit/blob/master/README.md

#Pwn

CTF 2019 OOB V8 Challenge

CTF 2019 OOB V8 Challenge - Ir0nstone

https://ir0nstone.gitbook.io/notes/types/browser-exploitation/ctf-2019-oob-v8/the-challenge

#Pwn

StarCTF OOB V8 Writeup

StarCTF OOB V8 Writeup - Faraz

https://faraz.faith/2019-12-13-starctf-oob-v8-indepth/

#Pwn

Simple Bugs Complex Exploits

Simple Bugs Complex Exploits - Elttam

https://www.elttam.com/blog/simple-bugs-with-complex-exploits/

#Pwn

Exploits Collection

Exploits Collection - R3tr074

https://github.com/R3tr074/exploits

#Pwn

Operation Triangulation

Operation Triangulation - Securelist

https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/

#Pwn

Triangulation Validators

Triangulation Validators - Securelist

https://securelist.com/triangulation-validators-modules/110847/

#Pwn

Operation Triangulation Overview

Operation Triangulation Overview - Securelist

https://securelist.com/operation-triangulation/109842/

#Pwn

TriangleDB Implant

TriangleDB Implant - Securelist

https://securelist.com/triangledb-triangulation-implant/110050/

#Pwn

Google VRP Bug Report

Google VRP Bug Report

https://bughunters.google.com/reports/vrp/38FmYpr1h

#Pwn

Heap Management Gist

Heap Management Gist - Theldus

https://gist.github.com/Theldus/4e1efc07ec13fb84fa10c2f3d054dccd

#Pwn

Villoc Tool

Villoc Tool - Wapiflapi

https://github.com/wapiflapi/villoc

#Pwn

Heaptrace Tool

Heaptrace Tool - Tsheinen

https://github.com/tsheinen/heaptrace

#Pwn

Zeratool

Zeratool - ChrisTheCoolHut

https://github.com/ChrisTheCoolHut/Zeratool

#Pwn

Halfempty Tool

Halfempty Tool - Google Project Zero

https://github.com/googleprojectzero/halfempty

#Pwn

Boofuzz

Boofuzz - Jtpereyda

https://github.com/jtpereyda/boofuzz

#Pwn

Moyix Twitter

Moyix Twitter

https://twitter.com/moyix/status/1765967602982027550

#Pwn

TP-Link Buffer Overflow

TP-Link Buffer Overflow - Boschko

https://boschko.ca/tp-link-tddp-bof/amp/

#Pwn

Gofetch

Gofetch

https://gofetch.fail/

#Pwn

Pixel 8 Kernel Code Execution

Pixel 8 Kernel Code Execution - Github Blog

https://github.blog/2024-03-18-gaining-kernel-code-execution-on-an-mte-enabled-pixel-8/

#Pwn

Flower Tool

Flower Tool - Xrombar

https://github.com/xrombar/flower

#Pwn

NFTables

NFTables - Pwning.Tech

https://pwning.tech/nftables/

#Pwn

American Conquest Exploit

American Conquest Exploit - Synacktiv

https://www.synacktiv.com/publications/exploiting-american-conquest

#Pwn

Fuzzing XML and JSON

Fuzzing XML and JSON - GNUCitizen

https://www.gnucitizen.org/blog/fuzzing-xml-and-json-pt-1/

#Pwn

Nautilus Fuzzer

Nautilus Fuzzer

https://github.com/nautilus-fuzz/nautilus

#Pwn

Ret2 Systems Wargames

Ret2 Systems Wargames

https://wargames.ret2.systems/

#Pwn

Heap Diagram

Heap Diagram - Cloudburst

https://raw.githubusercontent.com/cloudburst/libheap/master/heap.png

#Pwn

RopView Tool

RopView Tool - Elbee-Cyber

https://github.com/elbee-cyber/RopView

#Pwn

GWPSAN

GWPSAN - Google

https://github.com/google/gwpsan/

#Pwn

Intro to V8 Exploitation

Intro to V8 Exploitation - Matteo Malvica

https://www.matteomalvica.com/blog/2024/06/05/intro-v8-exploitation-maglev/

#Pwn

Fortigate RCE with CVE-2024-21762

Fortigate RCE with CVE-2024-21762 - AssetNote

https://www.assetnote.io/resources/research/two-bytes-is-plenty-fortigate-rce-with-cve-2024-21762

#Pwn

GDB Static

GDB Static - Hugsy

https://github.com/hugsy/gdb-static

#Pwn

Aperi'Solve

Aperi'Solve

https://www.aperisolve.fr/

#Stegano

stegoVeritas

Steganography Tool - stegoVeritas

https://github.com/bannsec/stegoVeritas

#Stegano

Sonic Visualiser

Sonic Visualiser

https://www.sonicvisualiser.org/

#Stegano

dhondta - gist 1

dhondta - gist 1

https://gist.github.com/dhondta/d2151c82dcd9a610a7380df1c6a0272c

#Stegano

dhondta - gist 2

dhondta - gist 2

https://gist.github.com/dhondta/feaf4f5fb3ed8d1eb7515abe8cde4880

#Stegano

dhondta - gist 3

dhondta - gist 3

https://gist.github.com/dhondta/30abb35bb8ee86109d17437b11a1477a

#Stegano

woodruffw/steg86

woodruffw/steg86

https://github.com/woodruffw/steg86

#Stegano

rw/plainsight

rw/plainsight

https://github.com/rw/plainsight

#Stegano

How to Convert/Decode a Slow Scan Television (SSTV) Audio File to Images using QSSTV in Ubuntu 18.04

How to Convert/Decode a Slow Scan Television (SSTV) Audio File to Images using QSSTV in Ubuntu 18.04

https://ourcodeworld.com/articles/read/956/how-to-convert-decode-a-slow-scan-television-transmissions-sstv-audio-file-to-images-using-qsstv-in-ubuntu-18-04

#Stegano

keyunluo/pkcrack

keyunluo/pkcrack

https://github.com/keyunluo/pkcrack

#Stegano

Hiding Messages in x86 Binaries Using Semantic Duals

Hiding Messages in x86 Binaries Using Semantic Duals

https://blog.yossarian.net/2020/08/16/Hiding-messages-in-x86-binaries-using-semantic-duals

#Stegano

woodruffw/steg86

woodruffw/steg86

https://github.com/woodruffw/steg86

#Stegano

Plainsight Enciphering Demo

Plainsight Enciphering Demo

https://www.jamieweb.net/blog/plainsight-enciphering-demo/

#Stegano

Tools Stegano

Tools Stegano

https://k-lfa.info/tools-stegano/

#Stegano

dhondta/python-tinyscript

dhondta/python-tinyscript

https://github.com/dhondta/python-tinyscript

#Stegano

Hiding Information by Changing an Image's Height

Hiding Information by Changing an Image's Height

https://blog.cyberhacktics.com/hiding-information-by-changing-an-images-height/

#Stegano

Paddinganography

Paddinganography

https://inshallhack.org/paddinganography/

#Stegano

dhondta - gist 4

dhondta - gist 4

https://gist.github.com/dhondta/90a07d9d106775b0cd29bb51ffe15954

#Stegano

jsummers/tweakpng

jsummers/tweakpng

https://github.com/jsummers/tweakpng

#Stegano

Les Images PNG : Comment ça marche ? Comment corriger manuellement les erreurs ?

Les Images PNG : Comment ça marche ? Comment corriger manuellement les erreurs ?

https://elsicarius.fr/les-images-png-comment-ca-marche-comment-corriger-manuellement-les-erreurs

#Stegano

ElSicarius - S3cur3_tr4a4xx_adm1n_acc0unt

ElSicarius - S3cur3_tr4a4xx_adm1n_acc0unt

https://elsicarius.fr/author/s3cur3_tr4a4xx_adm1n_acc0unt

#Stegano

Cloakify

Cloakify

https://github.com/TryCatchHCF/Cloakify

#Stegano

Chaîne YouTube nanobyte

Chaîne YouTube nanobyte

https://www.youtube.com/channel/UCSPIuWADJIMIf9Erf--XAsA/videos

#Ring0

DEF CON 29 - Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau

DEF CON 29 - Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau

https://www.youtube.com/watch?v=5zixNDolLrg

#Ring0

[Linux Kernel Exploitation] NULL pointer dereference bypass smep / ...

[Linux Kernel Exploitation] NULL pointer dereference bypass smep / ...

https://www.youtube.com/watch?v=Rx3sRn5garA

#Ring0

WTF is ACPI ? - LSE Week 2012

WTF is ACPI ? - LSE Week 2012

https://www.youtube.com/watch?v=iHuo-y1gFAs

#Ring0

Breaking the x86 Instruction Set

Breaking the x86 Instruction Set

https://www.youtube.com/watch?v=KrksBdWcZgQ

#Ring0

Write your own Operating System

Write your own Operating System

https://www.youtube.com/channel/UCQdZltW7bh1ta-_nCH7LWYw/featured

#Ring0

Conférence @Elf - de Kernel Module à eBPF

Conférence @Elf - de Kernel Module à eBPF

https://www.youtube.com/watch?v=FTdrqxf4loE

#Ring0

How Do Linux Kernel Drivers Work? - Learning Resource

How Do Linux Kernel Drivers Work? - Learning Resource

https://www.youtube.com/watch?v=juGNPLdjLH4

#Ring0

OffensiveCon20 - Alexander Popov - Exploiting a Linux Kernel Vulner...

OffensiveCon20 - Alexander Popov - Exploiting a Linux Kernel Vulnerability

https://www.youtube.com/watch?v=J6xIohyARSU

#Ring0

Temple Of PWN 13 - Kernel Exploitation

Temple Of PWN 13 - Kernel Exploitation

https://www.youtube.com/watch?v=dZgvLbuJiQ4

#Ring0

Kernel Exploitation

Kernel Exploitation

https://www.youtube.com/watch?v=HtdriW7KVNE

#Ring0

Race Conditions and Time of Check to Time of Use TOCTTOU Vulnerabil...

Race Conditions and Time of Check to Time of Use TOCTTOU Vulnerabilities

https://www.youtube.com/watch?v=PH73lpG2B1M

#Ring0

Hacking - Rootkit Development 09 - Hooking SysCall Read

Hacking - Rootkit Development 09 - Hooking SysCall Read

https://www.youtube.com/watch?v=_BSZKj_rF5A

#Ring0

Hacking - Rootkit Development 01

Hacking - Rootkit Development 01

https://www.youtube.com/watch?v=8dZFJEc-8uI

#Ring0

Virtual Memory: 3 What is Virtual Memory?

Virtual Memory: 3 What is Virtual Memory?

https://www.youtube.com/watch?v=qlH4-oHnBb8

#Ring0

Linux Kernel Pwning

Linux Kernel Pwning

https://www.youtube.com/watch?v=EoU3sXP2IH8

#Ring0

devse.wiki

devse.wiki

https://devse.wiki/

#Ring0

Create Your Own Kernel In C++

Create Your Own Kernel In C++

https://www.codeproject.com/Articles/1225196/Create-Your-Own-Kernel-In-C-2

#Ring0

Linux Insides - Booting

Linux Insides - Booting

https://0xax.gitbooks.io/linux-insides/content/Booting/linux-bootstrap-1.html

#Ring0

Modules Kernel Linux - Kali Linux

Modules Kernel Linux - Kali Linux

https://www.kali-linux.fr/hacking/modules-kernel-linux

#Ring0

8086 BIOS and DOS Interrupts

8086 BIOS and DOS Interrupts

http://www.ablmcc.edu.hk/~scy/CIT/8086_bios_and_dos_interrupts.htm

#Ring0

Linux Kernel System Map

Linux Kernel System Map

https://rlworkman.net/system.map/

#Ring0

CTF Writeups - Kernel

CTF Writeups - Kernel

https://ctftime.org/writeups?tags=kernel&hidden-tags=kernel

#Ring0

Linux Kernel Exploitation by xairy

Linux Kernel Exploitation by xairy

https://github.com/xairy/linux-kernel-exploitation

#Ring0

A Guide to Kernel Exploitation - l34n

A Guide to Kernel Exploitation - l34n

https://github.com/l34n/CySecBooks/blob/master/A%20Guide%20to%20Kernel%20Exploitation%20Attacking%20the%20Core.pdf

#Ring0

Le Monde du Kernel - Hackndo

Le Monde du Kernel - Hackndo

https://beta.hackndo.com/le-monde-du-kernel/

#Ring0

Les Failles Kernel - Hackndo

Les Failles Kernel - Hackndo

https://beta.hackndo.com/les-failles-kernel/

#Ring0

Kern Emporium

Kern Emporium

https://kernemporium.github.io/

#Ring0

Hotrod - syst3mfailure

Hotrod - syst3mfailure

https://syst3mfailure.io/hotrod

#Ring0

Exploit Database - Linux Kernel

Exploit Database - Linux Kernel

https://www.exploit-db.com/exploits/45045

#Ring0

Linux Kernel Pwn Part 1 - lkmidas

Linux Kernel Pwn Part 1 - lkmidas

https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/

#Ring0

Understanding the Linux Kernel - wogh8732

Understanding the Linux Kernel - wogh8732

https://wogh8732.tistory.com/323

#Ring0

How2Kernel - R3x

How2Kernel - R3x

https://github.com/R3x/How2Kernel

#Ring0

Introduction to Kernel - Kern Emporium

Introduction to Kernel - Kern Emporium

https://kernemporium.github.io/kernel/intro/

#Ring0

Null Pointer Dereference - bases-hacking.org

Null Pointer Dereference - bases-hacking.org

https://bases-hacking.org/null-pointer-dereference.html

#Ring0

Kernel Play Guide - NSKernel

Kernel Play Guide - NSKernel

https://nskernel.gitbook.io/kernel-play-guide/

#Ring0

TutoOS - A. Michelizza

TutoOS - A. Michelizza

http://a.michelizza.free.fr/pmwiki.php?n=TutoOS.TutoOS

#Ring0

Kernel 101 - Arjun Sreedharan

Kernel 101 - Arjun Sreedharan

https://arjunsreedharan.org/post/82710718100/kernel-101-lets-write-a-kernel

#Ring0

Arjun Sreedharan Blog

Arjun Sreedharan Blog

https://arjunsreedharan.org/

#Ring0

Learning KVM - David942j

Learning KVM - David942j

https://david942j.blogspot.com/2018/10/note-learning-kvm-implement-your-own.html

#Ring0

Pentester.blog

Pentester.blog

https://pentester.blog/?p=598

#Ring0

Create Your Own OS Blog

Create Your Own OS Blog

https://createyourownos.blogspot.com/

#Ring0

Introduction to eBPF - Zenika Blog

Introduction to eBPF - Zenika Blog

https://blog.zenika.com/2019/07/15/decouverte-ebpf/

#Ring0

Anatomy of a BzImage - LWN.net

Anatomy of a BzImage - LWN.net

https://lwn.net/Articles/717293/

#Ring0

C++ Virtual Machine - 0xNinja

C++ Virtual Machine - 0xNinja

https://0xninja.fr/c-vm/

#Ring0

Kernel ROP - hxp CTF 2020 Writeup

Kernel ROP - hxp CTF 2020 Writeup

https://hxp.io/blog/81/hxp-CTF-2020-kernel-rop/

#Ring0

Windows Kernel Exploitation - m101

Windows Kernel Exploitation - m101

https://m101.github.io/binholic/2018/04/28/windows-kernel-exploitation-token.html

#Ring0

Lord of the Ring0 - Idov31

Lord of the Ring0 - Idov31

https://idov31.github.io/2022-07-14-lord-of-the-ring0-p1/

#Ring0

Linux Kernel Hacking - Yardenshafir

Linux Kernel Hacking - Yardenshafir

https://github.com/yardenshafir/IoRingReadWritePrimitive

#Ring0

MiniOS Kernel - 0xMirasio

MiniOS Kernel - 0xMirasio

https://github.com/0xMirasio/kernel-MiniOS

#Ring0

Linux Kernel - Xcellerator

Linux Kernel - Xcellerator

https://xcellerator.github.io/categories/linux/

#Ring0

Linux Kernel Hacking - Xcellerator

Linux Kernel Hacking - Xcellerator

https://github.com/xcellerator/linux_kernel_hacking

#Ring0

Linux Kernel Defence Map - a13xp0p0v

Linux Kernel Defence Map - a13xp0p0v

https://github.com/a13xp0p0v/linux-kernel-defence-map

#Ring0

Sandsifter - Battelle

Sandsifter - Battelle

https://github.com/Battelle/sandsifter

#Ring0

Conférence @TheLaluka - Pentest Web 101

Conférence @TheLaluka - Pentest Web 101

https://www.youtube.com/watch?v=gPsm_Iz_yak

#Web

It's a PHP Unserialization Vulnerability Jim, but Not as We Know It

It's a PHP Unserialization Vulnerability Jim, but Not as We Know It

https://www.youtube.com/watch?v=OrEar0TiS90

#Web

Hacking Modern Desktop apps with XSS and RCE Workshop

Hacking Modern Desktop apps with XSS and RCE Workshop

https://www.youtube.com/watch?v=xILfQGkLXQo

#Web

🇫🇷 PROTOTYPE POLLUTION

🇫🇷 PROTOTYPE POLLUTION

https://www.youtube.com/watch?v=vZlP4I7yhI4

#Web

#HITB2017AMS D2T1 - Everybody Wants SOME: Advance Same Origin Methods

#HITB2017AMS D2T1 - Everybody Wants SOME: Advance Same Origin Methods

https://www.youtube.com/watch?v=OvarkOxxdic

#Web

Backslash Powered Scanning: Hunting Unknown Vulnerability Classes

Backslash Powered Scanning: Hunting Unknown Vulnerability Classes

https://www.youtube.com/watch?v=apOLZ67TZd0

#Web

Club EH RM 05 - Intro to JSON Web Token Exploitation

Club EH RM 05 - Intro to JSON Web Token Exploitation

https://www.youtube.com/watch?v=d7wmUz57Nlg

#Web

HTTP Request Smuggling

HTTP Request Smuggling

https://www.youtube.com/watch?v=okV4i19eCAg

#Web

Sql injection in SOAP API (API testing )

Sql injection in SOAP API (API testing )

https://www.youtube.com/watch?v=UINLbiq19NQ

#Web

Présentation - Modèle de classification XSS

Présentation - Modèle de classification XSS

https://www.youtube.com/watch?v=a0KUWOfXC_I

#Web

CORS in 100 Seconds

CORS in 100 Seconds

https://www.youtube.com/watch?v=4KHiSt0oLJ0

#Web

Les bonnes pratiques OAuth2/OIDC conjuguées au présent, passé simple et futur

Les bonnes pratiques OAuth2/OIDC conjuguées au présent, passé simple et futur

https://www.youtube.com/watch?v=PhQJKKrV5i0

#Web

Advanced PHP Deserialization - Phar Files

Advanced PHP Deserialization - Phar Files

https://www.youtube.com/watch?v=fHZKSCMWqF4

#Web

Burpsuite tricks - xanhacks

Burpsuite tricks - xanhacks

https://www.youtube.com/watch?v=1Ae94tigBiM

#Web

Edge Side Include Injection: Abusing Caching Servers into SSRF and Local File Inclusion

Edge Side Include Injection: Abusing Caching Servers into SSRF and Local File Inclusion

https://www.youtube.com/watch?v=6t50uRAxFT8

#Web

Two Bugs To Rule Them All: Taking Over The PHP Supply Chain by Thomas Orlita

Two Bugs To Rule Them All: Taking Over The PHP Supply Chain by Thomas Orlita

https://www.youtube.com/watch?v=RLcK0kRGpjw

#Web

Olivier Arteau -- Prototype pollution attacks in NodeJS applications

Olivier Arteau -- Prototype pollution attacks in NodeJS applications

https://www.youtube.com/watch?v=LUsiFV3dsK8

#Web

Intro to PHP Deserialization / Object Injection

Intro to PHP Deserialization / Object Injection

https://www.youtube.com/watch?v=HaW15aMzBUM

#Web

PHP Type Juggling - Why === is Important - Sponsored Content

PHP Type Juggling - Why === is Important - Sponsored Content

https://www.youtube.com/watch?v=idC5SAsKhlE

#Web

Hack A Blazor WASM App (At Your Own Risk)

Hack A Blazor WASM App (At Your Own Risk)

https://www.youtube.com/watch?v=Xx1eMlscXrQ

#Web

Relative Path Overwrite XSS - Baptiste Moine

Relative Path Overwrite XSS - Baptiste Moine

https://www.youtube.com/watch?v=Ama6jrsjRlM

#Web

HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape

HackTheBox "Business CTF" - discordvm - Node.js Sandbox Escape

https://www.youtube.com/watch?v=pzh6--wIp24

#Web

Hacking ELECTRON: JavaScript Desktop Applications w/ 7aSecurity

Hacking ELECTRON: JavaScript Desktop Applications w/ 7aSecurity

https://www.youtube.com/watch?v=P8QvSjL8F9w

#Web

Creating Custom Nuclei Templates and Workflows

Creating Custom Nuclei Templates and Workflows

https://www.youtube.com/watch?v=bHXkQjtBOLo

#Web

XSS Filter Bypass | Escape Quotes | Part 9

XSS Filter Bypass | Escape Quotes | Part 9

https://www.youtube.com/watch?v=DOLb_hNOpXk

#Web

OAUTH 2.1 expliqué simplement (même si tu n'es pas dev) ! (Julien Tasso)

OAUTH 2.1 expliqué simplement (même si tu n'es pas dev) ! (Julien Tasso)

https://www.youtube.com/watch?v=YdShQveywpo

#Web

Web Security Academy Thèmes

Explorez différents thèmes de sécurité web sur Hackitude

https://www.hackitude.in/labs-web-security-academy-th%C3%A8mes

#Web

AWAE Preparation

Préparation pour l'Offensive Security Web Expert (AWAE)

https://z-r0crypt.github.io/blog/2020/01/22/oswe/awae-preparation/

#Web

H2C Smuggler

Tool for HTTP/2 cleartext (h2c) smuggling

https://github.com/BishopFox/h2csmuggler

#Web

Impersonated Brave.com pushes Malware

Google assists in the detection of malware on Brave.com

https://arstechnica.com/gadgets/2021/07/with-help-from-google-impersonated-brave-com-website-pushes-malware/

#Web

Twitter Post - Podalirius

Twitter post discussing a security topic by Podalirius

https://twitter.com/podalirius_/status/1420072160450785280

#Web

PortSwigger Web Security Labs

Interactive labs to learn web security on PortSwigger

https://portswigger.net/web-security/all-labs

#Web

Gist by terjanq

Gist repository with security-related content by terjanq

https://gist.github.com/terjanq/458d8ec1148e96f7ccbdccfd908c56f6

#Web

FCSC 2021 Web Writeups

Writeups from FCSC 2021 related to web security challenges

https://github.com/dspiricate/writeups/tree/main/FCSC/2021/web/Shared%20notes

#Web

Bezkoder

Website featuring tutorials and resources for developers

https://www.bezkoder.com/

#Web

Polyglot Files - A Hacker's Best Friend

Exploration of polyglot files in hacking scenarios

https://medium.com/swlh/polyglot-files-a-hackers-best-friend-850bf812dd8a

#Web

NoSQL Injections: Classic & Blind

Overview of classic and blind NoSQL injection techniques

https://www.dailysecurity.fr/nosql-injections-classique-blind/

#Web

Web Checklist - Pentestbook

Checklist for web penetration testing from Pentestbook

https://pentestbook.six2dez.com/others/web-checklist

#Web

Pourquoi Next.js?

Article in French discussing the benefits of Next.js

https://practicalprogramming.fr/pourquoi-next-js

#Web

CSP Evaluator

Tool to evaluate Content Security Policy headers

https://csp-evaluator.withgoogle.com/

#Web

JSONBee

Tool for blind JSON injection testing

https://github.com/zigoo0/JSONBee

#Web

Twitter Post - Podalirius

Another Twitter post discussing a security topic by Podalirius

https://twitter.com/podalirius_/status/1447455234071146497

#Web

0xHorizon Articles

Articles related to cybersecurity and web topics on 0xHorizon

https://0xhorizon.eu/articles/

#Web

HTTP Request Smuggling - Bachelor's Thesis

Research on HTTP request smuggling

https://github.com/mattiasgrenfeldt/bachelors-thesis-http-request-smuggling/

#Web

HTTP Response Splitting - SlideShare

SlideShare presentation on HTTP response splitting

https://fr.slideshare.net/h4xorhead/http-response-splitting-39437258

#Web

HTTP Response Splitting - OWASP

OWASP guide on HTTP response splitting attacks

https://owasp.org/www-community/attacks/HTTP_Response_Splitting

#Web

PHP Exploit - GitList

Exploit for bypassing PHP escapeshellarg and escapeshellcmd

https://github.com/kacperszurek/exploits/blob/master/GitList/exploit-bypass-php-escapeshellarg-escapeshellcmd.md

#Web

Python Deserialization Attack Payload Generator

Tool for generating payloads for Python deserialization attacks

https://github.com/j0lt-github/python-deserialization-attack-payload-generator

#Web

PHP-FPM Local Root Exploit

Blog post detailing a PHP-FPM local root exploit

https://www.ambionics.io/blog/php-fpm-local-root

#Web

JavaScript Prototype Pollution - Exploitation

Article on finding and exploiting JavaScript prototype pollution vulnerabilities

https://infosecwriteups.com/javascript-prototype-pollution-practice-of-finding-and-exploitation-f97284333b2

#Web

HTTP Response Splitting Attack - Infosec Institute

Information on conducting HTTP response splitting attacks

https://resources.infosecinstitute.com/topic/http-response-splitting-attack/

#Web

Cross-Site WebSocket Hijacking (CSWSH)

Explanation and mitigation techniques for CSWSH attacks

https://infosecwriteups.com/cross-site-websocket-hijacking-cswsh-ce2a6b0747fc

#Web

Exploiting PHP Deserialization

Techniques for exploiting PHP deserialization vulnerabilities

https://medium.com/swlh/exploiting-php-deserialization-56d71f03282a

#Web

PHP Serialization Format - Wikipedia

Information about the PHP serialization format

https://en.wikipedia.org/wiki/PHP_serialization_format

#Web

Web Application Wordlists - GitHub

Collection of wordlists for web applications

https://github.com/p0dalirius/webapp-wordlists

#Web

Rusty Joomla RCE - Hacktive Security Blog

Blog post detailing a remote code execution vulnerability in Joomla

https://blog.hacktivesecurity.com/index.php/2019/10/03/rusty-joomla-rce/

#Web

RequestBin

Tool for inspecting HTTP requests

https://requestbin.com/

#Web

XSS Reflected - 0xHorizon

Article on reflected XSS vulnerabilities

https://0xhorizon.eu/fr/articles/xss-reflected/

#Web

IP Source Bypass - GitHub

Tool for bypassing IP source restrictions

https://github.com/p0dalirius/ipsourcebypass

#Web

PHP Stream Wrappers and Filters

Exploration of PHP stream wrappers and filters

https://blog.eleven-labs.com/fr/php-stream-wrappers-filters/

#Web

Expressitoo

Website featuring security-related content

https://expressitoo.github.io/

#Web

PIL RCE Ghostscript CVE-2018-16509 - GitHub

Exploit for CVE-2018-16509 affecting Ghostscript in PIL

https://github.com/farisv/PIL-RCE-Ghostscript-CVE-2018-16509

#Web

Vaadata Blog

Articles and insights on cybersecurity from Vaadata

https://www.vaadata.com/blog/fr/

#Web

Twitter Post - Podalirius

Twitter post discussing a security topic by Podalirius

https://twitter.com/podalirius_/status/1488921781637365771

#Web

CSPass - GitHub

Tool for generating Content Security Policy (CSP) headers

https://github.com/Ruulian/CSPass

#Web

React GitHub Issue #3473

GitHub issue discussing React framework

https://github.com/facebook/react/issues/3473

#Web

Wizdler Firefox Add-on

Firefox add-on for viewing and editing web API definitions

https://addons.mozilla.org/fr/firefox/addon/wizdler/

#Web

PimpMyBurp - YesWeHack Blog

Articles and tips on enhancing Burp Suite functionality

https://blog.yeswehack.com/category/yeswerhackers/pimpmyburp/

#Web

OWASP Cheat Sheet Series

Cheat sheets for various web application security topics from OWASP

https://cheatsheetseries.owasp.org/index.html

#Web

CSS Data Theft Techniques - Sekurak Blog

Techniques for data theft using CSS attacks on web applications

https://sekurak.pl/wykradanie-danych-w-swietnym-stylu-czyli-jak-wykorzystac-css-y-do-atakow-na-webaplikacje/

#Web

HackMD - Chivato

Document on a web security topic on HackMD

https://hackmd.io/@Chivato/HyWsJ31dI

#Web

New XSS Vectors - PortSwigger Research

Research on new cross-site scripting (XSS) attack vectors

https://portswigger.net/research/new-xss-vectors

#Web

Symfony Secret Fragment - Ambionics Blog

Exploration of Symfony secret fragment vulnerabilities

https://www.ambionics.io/blog/symfony-secret-fragment

#Web

Looting Symfony with EOS - Synacktiv

Research on exploiting Symfony vulnerabilities with EOS

https://www.synacktiv.com/en/publications/looting-symfony-with-eos.html

#Web

Web Pentest Cheat Sheet - Haax.fr

Cheat sheet for web penetration testing

https://cheatsheet.haax.fr/web-pentest/

#Web

From LFI to RCE via PHP Sessions - RCESecurity

Exploiting PHP sessions for local file inclusion (LFI) to remote code execution (RCE)

https://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/

#Web

SSRFmap - GitHub

Tool for scanning SSRF vulnerabilities

https://github.com/swisskyrepo/SSRFmap

#Web

Finding Unique Values in JavaScript Arrays

Technique for finding unique values in JavaScript arrays

https://levelup.gitconnected.com/how-to-find-unique-values-by-property-in-an-array-of-objects-in-javascript-50ca23db8ccc

#Web

CRLFsuite - GitHub

Tool for testing HTTP response splitting vulnerabilities

https://github.com/Nefcore/CRLFsuite

#Web

Ysomap - GitHub

Tool for automating exploitation of deserialization vulnerabilities

https://github.com/wh1t3p1g/ysomap

#Web

XXEinjector - GitHub

Tool for exploiting XXE (XML External Entity) vulnerabilities

https://github.com/enjoiz/XXEinjector

#Web

SSRF Server-Side Request Forgery - HackTricks

Guide on SSRF vulnerabilities and exploitation

https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery

#Web

Gopherus - GitHub

Tool for exploiting SSRF via Gopher protocol

https://github.com/tarunkant/Gopherus

#Web

Weevely3 - GitHub

Tool for web application exploitation

https://github.com/epinna/weevely3

#Web

All About Bug Bounty - GitHub

Comprehensive guide and resources for bug bounty hunting

https://github.com/daffainfo/AllAboutBugBounty

#Web

Bug Bounty - GitHub

Guide and resources for bug bounty programs

https://github.com/Anlominus/Bug-Bounty

#Web

Twitter Post - MeAsHacker_HNA

Twitter post discussing a security topic by MeAsHacker_HNA

https://twitter.com/MeAsHacker_HNA/status/1538862575617814528

#Web

Twitter Post - Podalirius

Another Twitter post discussing a security topic by Podalirius

https://twitter.com/podalirius_/status/1554132093608804354

#Web

Node.Js Security Course - NodeJS Shell

Python shell script for Node.js security testing

https://github.com/ajinabraham/Node.Js-Security-Course/blob/master/nodejsshell.py

#Web

HTTP Response Splitting - 0xHorizon

Article on HTTP response splitting vulnerabilities

https://0xhorizon.eu/fr/articles/http-response-splitting/

#Web

Bit Shifting Blind Injection Simplified - Blog

Simplified explanation of bit-shifting blind SQL injection

http://blog.k3170makan.com/2012/01/bit-shifting-blind-injection-simplified.html

#Web

Damn Vulnerable Web Application (DVWA) - Walkthroughs

Walkthrough of Damn Vulnerable Web Application

https://sharpforce.gitbook.io/cybersecurity/walkthroughs/damn-vulnerable-web-application/damn-vulnerable-web-application-dvwa

#Web

LFI to RCE via PHP Filters - HackTricks

Exploiting LFI to RCE via PHP filters

https://book.hacktricks.xyz/pentesting-web/file-inclusion/lfi2rce-via-php-filters

#Web

Awesome ElectronJS Hacking - GitHub

Resources and tools for ElectronJS security testing

https://github.com/doyensec/awesome-electronjs-hacking

#Web

Cent - GitHub

Container orchestration security tools

https://github.com/xm1k3/cent

#Web

Wapiti - GitHub

Web application vulnerability scanner

https://github.com/devl00p/wapiti

#Web

The Secret Parameter LFR and Potential RCE in NodeJS Apps - Blog

Discussion on parameter tampering and RCE in Node.js applications

https://blog.shoebpatel.com/2021/01/23/The-Secret-Parameter-LFR-and-Potential-RCE-in-NodeJS-Apps/

#Web

NodeJS Red Team Cheat Sheet - GitHub

Cheat sheet for Node.js red team operations

https://github.com/aadityapurani/NodeJS-Red-Team-Cheat-Sheet

#Web

Sandboxing Node.js is Hard - Pwnisher Blog

Challenges and techniques for sandboxing Node.js applications

https://pwnisher.gitlab.io/nodejs/sandbox/2019/02/21/sandboxing-nodejs-is-hard.html

#Web

PHP Object Injection Exploitation Notes - GitHub Gist

Notes on exploiting PHP object injection vulnerabilities

https://gist.github.com/jcreedcmu/4f6e6d4a649405a9c86bb076905696af?permalink_comment_id=3846798

#Web

Introduction to Prototype Pollution - Shieldfy

Introduction to prototype pollution vulnerabilities

https://shieldfy.io/security-wiki/prototype-pollution/introduction-to-prototype-pollution/

#Web

DOM Clobbering - It's Clobbering Time - Medium

Article on DOM clobbering vulnerabilities

https://medium.com/@shilpybanerjee/dom-clobbering-its-clobbering-time-f8dd5c8fbc4b

#Web

Twitter Silhouette - Twitter Engineering Blog

Blog post from Twitter on Twitter Silhouette

https://blog.twitter.com/engineering/en_us/topics/insights/2018/twitter_silhouette

#Web

XS-Leaks - AppSec Monkey Blog

Exploration of cross-site leaks vulnerabilities

https://www.appsecmonkey.com/blog/xs-leaks

#Web

Pop Chains - Insecure Deserialization

Exploiting insecure deserialization vulnerabilities

https://vickieli.dev/insecure%20deserialization/pop-chains/

#Web

Diving into Unserialize - Medium

Exploration of PHP unserialize function and vulnerabilities

https://medium.com/swlh/diving-into-unserialize-3586c1ec97e

#Web

JWTweak - GitHub

Tool for JWT token manipulation

https://github.com/rishuranjanofficial/JWTweak

#Web

JWTSWISSKNIFE - GitHub

Tool for JWT token analysis and manipulation

https://github.com/TRIKKSS/JWTSWISSKNIFE

#Web

Path Truncations - DailySecurity

Exploiting path truncation vulnerabilities

https://www.dailysecurity.fr/les-path-truncations/

#Web

RSA Sign2n - GitHub

Tool for RSA signature forgery

https://github.com/silentsignal/rsa_sign2n

#Web

LFIDump - GitHub

Tool for dumping Local File Inclusion (LFI) vulnerabilities

https://github.com/p0dalirius/LFIDump

#Web

Blog on Gopherus - SpyClub

Blog post discussing the Gopherus tool

https://spyclub.tech/2018/08/14/2018-08-14-blog-on-gopherus/

#Web

GraphQL Common Vulnerabilities - Medium

Common vulnerabilities and exploitation in GraphQL

https://the-bilal-rizwan.medium.com/graphql-common-vulnerabilities-how-to-exploit-them-464f9fdce696

#Web

How to Exploit GraphQL Endpoint - YesWeHack Blog

Guide on exploiting GraphQL endpoints for bug bounty

https://blog.yeswehack.com/yeswerhackers/how-exploit-graphql-endpoint-bug-bounty/

#Web

GraphQL Vulnerabilities - Cheat Sheet

Cheat sheet for GraphQL vulnerabilities

https://0xn3va.gitbook.io/cheat-sheets/web-application/graphql-vulnerabilities

#Web

Param Miner - GitHub

Tool for mining parameters from web applications

https://github.com/PortSwigger/param-miner

#Web

SSLScan - GitHub

Tool for testing SSL/TLS vulnerabilities

https://github.com/rbsec/sslscan

#Web

PHP Object Injection Exploitation - SnoopySecurity

Exploiting PHP object injection vulnerabilities

https://snoopysecurity.github.io/web-application-security/2021/01/08/02_php_object_injection_exploitation-notes.html

#Web

Remote Code Execution via PHP Unserialize - NotSoSecure

Techniques for exploiting PHP unserialize for RCE

https://notsosecure.com/remote-code-execution-php-unserialize

#Web

Exploiting Memory Corruption Bugs - BleepingComputer

Exploiting memory corruption bugs in JavaScript

https://www.bleepingcomputer.com/news/security/invisible-characters-could-be-hiding-backdoors-in-your-javascript-code/

#Web

Atlas - GitHub

Tool for targeted scanning and exploitation

https://github.com/m4ll0k/Atlas

#Web

Twitter Post - Bughunter

Twitter post discussing a security topic by Bughunter

https://twitter.com/_bughunter/status/1577622994897215488?t=3PEK40bh0MBAVIMHl-OaaQ&s=19

#Web

VAF - GitHub

Tool for exploiting vulnerable access points

https://github.com/d4rckh/vaf

#Web

Intigriti Twitter Post

Twitter post discussing a security topic by Intigriti

https://twitter.com/intigriti/status/1582334895405531137?s=46&t=cTpgYzx6oqBSszNo0uvpDQ

#Web

PHP Filter Chain Generator - Synacktiv

Tool for generating PHP filter chains

https://github.com/synacktiv/php_filter_chain_generator

#Web

Server-Side Request Forgery - Cheat Sheet

Cheat sheet for server-side request forgery (SSRF)

https://0xn3va.gitbook.io/cheat-sheets/web-application/server-side-request-forgery

#Web

P0wny Shell - GitHub

Web shell for penetration testing

https://github.com/flozz/p0wny-shell/

#Web

Vercel Twitter Post

Twitter post discussing a security topic by Vercel

https://twitter.com/vercel/status/1584964835984703491?t=BfM8iyBIAYaCLsvHuCdRhQ&s=19

#Web

Backslash-Powered Scanning - PortSwigger Research

Research on using backslash for scanning and vulnerability hunting

https://portswigger.net/research/backslash-powered-scanning-hunting-unknown-vulnerability-classes

#Web

Nuclei Templates Creation - Andy Svints Blog

Experience in creating Nuclei templates for security testing

https://www.andysvints.com/nuclei-templates-creation-my-experience/

#Web

Hacker Tools: Nuclei - Intigriti Blog

Overview of hacker tools like Nuclei for security testing

https://blog.intigriti.com/2021/05/10/hacker-tools-nuclei/

#Web

Burp Suite Extension - BAppStore

Burp Suite extension for security testing

https://portswigger.net/bappstore/526f5564b7414bfe978e650d8ea6567b

#Web

Dfunc Bypasser - GitHub

Tool for bypassing security controls in web applications

https://github.com/teambi0s/dfunc-bypasser

#Web

Bypassing PHP disable_functions with Chankro - 0xdf Blog

Techniques for bypassing PHP disable_functions with Chankro

https://0xdf.gitlab.io/2019/08/02/bypassing-php-disable_functions-with-chankro.html

#Web

Rengine - GitHub

Tool for reconnaissance and intelligence gathering

https://github.com/yogeshojha/rengine

#Web

Galer - GitHub

Tool for security analysis of APIs

https://github.com/dwisiswant0/galer

#Web

API Security Checklist - Pentest-Tools

Checklist for API security testing

https://gitlab.com/pentest-tools/API-Security-Checklist

#Web

Time-Based Data Exfiltration - Security Cafe Blog

Techniques for time-based data exfiltration

https://securitycafe.ro/2017/02/28/time-based-data-exfiltration/

#Web

FFUF Advanced Tricks - Acceis Blog

Advanced usage tricks for FFUF tool

https://www.acceis.fr/ffuf-advanced-tricks/

#Web

XS-Leaks - Official Website

Information on cross-site leaks and vulnerabilities

https://xsleaks.dev/

#Web

Pwnfox - Mozilla Firefox Addon

Addon for security testing and exploitation

https://addons.mozilla.org/fr/firefox/addon/pwnfox/

#Web

WebSec - Resources and Information

Resource hub for web security enthusiasts

https://websec.fr/

#Web

Using an Android Emulator for API Hacking - ZeroDayHacker

Using Android emulator for API security testing

https://zerodayhacker.com/using-an-android-emulator-for-api-hacking/

#Web

URI Explained - Elsicarius Blog

Exploration of URIs and their security implications

https://elsicarius.fr/les-uri-vous-connaissez

#Web

Blind SQLi over WebSocket Automation - Rayhan0x01 Blog

Automation techniques for blind SQL injection over WebSocket

https://rayhan0x01.github.io/ctf/2021/04/02/blind-sqli-over-websocket-automation.html

#Web

Bypass CAPTCHAs using Python - CloudSEK Blog

Techniques for bypassing CAPTCHAs using Python

https://cloudsek.com/how-to-bypass-captchas-easily-using-python-and-other-methods/

#Web

AdonisJS - GitHub

Framework for building Node.js web applications

https://github.com/adonisjs/core

#Web

Swagger Parser - GitLab

Tool for parsing and interacting with Swagger APIs

https://gitlab.com/onemask/swaggerparser

#Web

XXE Blind Exploitation - PortSwigger

Exploiting blind XXE (XML External Entity) vulnerabilities

https://portswigger.net/web-security/xxe/blind

#Web

GraphQL Voyager - Ivan Goncharov

Interactive exploration tool for GraphQL schemas

https://ivangoncharov.github.io/graphql-voyager/

#Web

Inql - GitHub

GraphQL security testing tool

https://github.com/doyensec/inql

#Web

GraphQL Playground - GitHub

Interactive GraphQL IDE and testing tool

https://github.com/graphql/graphql-playground

#Web

Inql - GitHub

GraphQL security testing tool

https://github.com/doyensec/inql

#Web

PHP Tricks - Devansh Blog

Tricks and techniques for PHP security testing

https://devansh.xyz/ctfs/2021/09/11/php-tricks.html

#Web

BUUCTF Web Writeup - Exploit

Writeup and exploitation techniques for BUUCTF web challenges

https://exp10it.cn/2022/11/buuctf-web-writeup-8/

#Web

GraphQL Editor - GraphQLEditor

Tool for editing and visualizing GraphQL schemas

https://graphqleditor.com/fr/

#Web

Fuzzing for XSS via Nested Parsers - PTSecurity

Fuzzing techniques for XSS via nested parsers

https://swarm.ptsecurity.com/fuzzing-for-xss-via-nested-parsers-condition/

#Web

PHP Issue on GitHub - PHP

Issue discussion on GitHub regarding PHP

https://github.com/php/php-src/issues/10469

#Web

GLPI HTMLawed CVE-2022-35914 - Mayfly Blog

CVE-2022-35914 exploitation in GLPI using HTMLawed

https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/

#Web

MXSS CVE-2020-26870 - Slides

Slides on MXSS (Mutation XSS) vulnerability CVE-2020-26870

https://slides.com/kevin-mizu/mxss-cve-2020-26870

#Web

HTML Sanitizer - Slides

Slides on HTML sanitization techniques

https://slides.com/kevin-mizu/html-sanitizer

#Web

Bypass URL Parser - GitHub

Tool for bypassing URL parsers

https://github.com/laluka/bypass-url-parser

#Web

Source Codester - Website

Collection of source code and resources

https://www.sourcecodester.com/

#Web

Exploitation of UUID - XMCO

Exploitation of UUID for compromising accounts

https://www.xmco.fr/veille-vulnerabilites-fr/exploitation-uuid-compromission-compte/

#Web

GLPIAnarchy - GitHub

Tool for exploiting vulnerabilities in GLPI

https://github.com/Feals-404/GLPIAnarchy

#Web

HTTP Request Smuggler - PortSwigger

Research on hidden HTTP request smuggling attack vectors

https://github.com/PortSwigger/http-request-smuggler

#Web

Hidden OAuth Attack Vectors - PortSwigger Research

Research on hidden OAuth attack vectors

https://portswigger.net/research/hidden-oauth-attack-vectors

#Web

OWASP ASVS Write-ups - GitBook

Write-ups and explanations for OWASP Application Security Verification Standard

https://owasp-skf.gitbook.io/asvs-write-ups/

#Web

BurpSuite - GitHub

Tool for web application security testing

https://github.com/x-Ai/BurpSuite

#Web

Server-side Prototype Pollution - YesWeHack Blog

Detection and exploitation techniques for server-side prototype pollution

https://blog.yeswehack.com/talent-development/server-side-prototype-pollution-how-to-detect-and-exploit/

#Web

Server-side Prototype Pollution - PortSwigger

Explanation and examples of server-side prototype pollution vulnerabilities

https://portswigger.net/web-security/prototype-pollution/server-side

#Web

Worldwide Server-side Cache Poisoning - Medium

Article on cache poisoning affecting Akamai edge nodes

https://medium.com/@jacopotediosi/worldwide-server-side-cache-poisoning-on-all-akamai-edge-nodes-50k-bounty-earned-f97d80f3922b

#Web

Wizdler - Mozilla Firefox Addon

Addon for interacting with SOAP web services

https://addons.mozilla.org/en-US/firefox/addon/wizdler/

#Web

Server-side Cache Poisoning - Twitter Post

Twitter post discussing server-side cache poisoning

https://twitter.com/kevin_mizu/status/1628665943797669890?s=46&t=1ohrl4OjJp9gO0lreTvpgA

#Web

Cross-site Smallish Scripting - TrustedSec Blog

Blog post discussing cross-site smallish scripting

https://www.trustedsec.com/blog/cross-site-smallish-scripting-xsss/

#Web

Blind SSRF Chains - GitHub

Tool for exploiting blind SSRF vulnerabilities

https://github.com/assetnote/blind-ssrf-chains

#Web

Diagrams and Movies of OAuth 2.0 Flows - Medium

Illustrated guide to OAuth 2.0 flows

https://darutk.medium.com/diagrams-and-movies-of-all-the-oauth-2-0-flows-194f3c3ade85

#Web

SAML Insecurity - Joonas Blog

Article on insecurities in SAML

https://joonas.fi/2021/08/saml-is-insecure-by-design/

#Web

HTB: Oouch - 0xdf Blog

Write-up of Hack The Box machine "Oouch"

https://0xdf.gitlab.io/2020/08/01/htb-oouch.html

#Web

Burp Suite Certified Practitioner Exam Study - GitHub

Study resources for the Burp Suite Certified Practitioner exam

https://github.com/botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study

#Web

Vulnerable Code Snippets - GitHub

Collection of vulnerable code snippets for educational purposes

https://github.com/yeswehack/vulnerable-code-snippets

#Web

PP Finder - GitHub

Tool for finding potential prototype pollution vulnerabilities

https://github.com/yeswehack/pp-finder

#Web

Challenges by Blaklis - GitHub

Collection of security challenges

https://github.com/Blaklis/my-challenges

#Web

GraphQL for Pentesters - Acceis Blog

Guide for pentesters on GraphQL security testing

https://www.acceis.fr/graphql-for-pentesters/

#Web

FlowMate - GitHub

Tool for analyzing data flow and dependencies

https://github.com/usdAG/FlowMate

#Web

Top 10 Web Hacking Techniques 2023 - PortSwigger

Compilation of top web hacking techniques for 2023

https://portswigger.net/polls/top-10-web-hacking-techniques-2023

#Web

HTMX - Official Documentation

Documentation for HTMX library

https://htmx.org/docs/

#Web

HATEOAS - Wikipedia

Explanation of HATEOAS (Hypermedia as the Engine of Application State)

https://en.wikipedia.org/wiki/HATEOAS

#Web

Hacking HTMX Applications - Infosec Writeups

Guide on hacking HTMX applications

https://infosecwriteups.com/hacking-htmx-applications-f8d29665faf

#Web

Awesome WAF - GitHub

Collection of awesome Web Application Firewalls (WAFs)

https://github.com/0xInfection/Awesome-WAF

#Web

Cariddi - GitHub

Tool for crawling domains and scanning for endpoints, secrets, and more

https://github.com/edoardottt/cariddi

#Web

Grroxy

Proxy service for browsing anonymously

https://grroxy.com/

#Web

Cook - GitHub

Tool for web application security testing

https://github.com/glitchedgitz/cook

#Web

Jinja2 Template Injection Filter Bypasses - 0day.work

Techniques for bypassing Jinja2 template injection filters

https://0day.work/jinja2-template-injection-filter-bypasses/

#Web

Detecting and Exploiting Path Relative Stylesheet Import (PRSSI) Vulnerabilities - PortSwigger

Research on PRSSI vulnerabilities

https://portswigger.net/research/detecting-and-exploiting-path-relative-stylesheet-import-prssi-vulnerabilities

#Web

Grafana CVE-2021-43798 - VulnCheck

Analysis of Grafana vulnerability CVE-2021-43798

https://vulncheck.com/blog/grafana-cve-2021-43798

#Web

Reflector - GitHub

Tool for reflective cross-site scripting (RXSS) testing

https://github.com/elkokc/reflector

#Web

KNOXSS - Website

Cross-site scripting testing tool

https://knoxss.me/

#Web

SOZU - GitHub

Modern HTTP reverse proxy and load balancer

https://github.com/sozu-proxy/sozu

#Web

WordPress Webshell Plugin - GitHub

Plugin for adding webshell functionality to WordPress

https://github.com/p0dalirius/Wordpress-webshell-plugin

#Web

🔥 🤯 MALWARE COBALT STRIKE INDETECTABLE 🤯 🔥

Description non disponible

https://www.youtube.com/watch?v=CHk2XzFKwNc

#Red-team

Modern Windows Command & Control / Implants

Description non disponible

https://www.youtube.com/watch?v=3TOiqGMCAOg

#Red-team

MacOS Phishing: File Extension Spoofing

Description non disponible

https://www.youtube.com/watch?v=jMKtlS9H_TQ

#Red-team

#HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & K...

Description non disponible

https://www.youtube.com/watch?v=CKfjLnEMfvI

#Red-team

06 - BruCON 0x0F - Red Team Tales: 7 Years of Physical Penetration ...

Description non disponible

https://www.youtube.com/watch?v=Ns-PvO6xUOI

#Red-team

Evil ClickOnce Backdooring Legit NET Application for Initial Access

Description non disponible

https://www.youtube.com/watch?v=UuhEzY4d6KM

#Red-team

Malware Club

Description non disponible

https://youtube.com/@malwareclub188

#Red-team

crow

Description non disponible

https://www.youtube.com/@crr0ww

#Red-team

15. Improving the Stealthiness of Memory Injection Techniques by Di...

Description non disponible

https://www.youtube.com/watch?v=_TEnBLt2JF4

#Red-team

c3rb3ru5d3d53c

Description non disponible

https://youtube.com/c/c3rb3ru5d3d53c

#Red-team

#HITBLockdown D2 - Documents Of Doom: Infecting Macos Via Office Ma...

Description non disponible

https://www.youtube.com/watch?v=-iSMrYZbbgo

#Red-team

RTV: Payload Delivery For Initial Access In Red Team Engagement by ...

Description non disponible

https://www.youtube.com/watch?v=bv53rYl34og

#Red-team

Writing Tiny, Efficient, And Reliable Malware by Rad Kawar

Description non disponible

https://www.youtube.com/watch?v=TfG9lBYCOq8&start=690

#Red-team

Introducing SEC565: Red Team Operations And Adversary Emulation

Description non disponible

https://www.youtube.com/watch?v=TwLLL8Ain24

#Red-team

DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red...

Description non disponible

https://www.youtube.com/watch?v=VWQY5R2A6X8

#Red-team

DEF CON 29 - Cedric Owens - Gone Apple Pickin: Red Teaming MacOS E...

Description non disponible

https://www.youtube.com/watch?v=IiMladUbL6E

#Red-team

DEF CON 29 Adversary Village - Matthew Eidelberg - Operation Bypas...

Description non disponible

https://www.youtube.com/watch?v=69xsb_TeazA

#Red-team

MCTTP 2023 | Talk by Fabian Mosch

Description non disponible

https://www.youtube.com/watch?v=XAvAVKXXC_8

#Red-team

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly o...

Description non disponible

https://www.youtube.com/watch?v=StSLxFbVz0M

#Red-team

S3cur3Th1sSh1t

Description non disponible

https://www.youtube.com/@user-lf7lp1el9j/featured

#Red-team

Five Ways I got Caught before Lunch - Mystikcon 2021

Description non disponible

https://www.youtube.com/watch?v=qIbrozlf2wM

#Red-team

#HITB2021AMS D1T1 - MacOS Security: Escaping The Sandbox & Bypassin...

Description non disponible

https://www.youtube.com/watch?v=UAkC-brF6iQ

#Red-team

13. Fun with Shellcode(loaders) by Jean Maes

Description non disponible

https://www.youtube.com/watch?v=2UruLKYwyEc

#Red-team

11. Evasion in Depth - Techniques Across the Kill-Chain by Mariusz ...

Description non disponible

https://www.youtube.com/watch?v=IbA7Ung39o4

#Red-team

DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Frame...

Description non disponible

https://www.youtube.com/watch?v=0Z3VadqyFiM

#Red-team

Prelude Discord Live Stream Series

Description non disponible

https://youtube.com/playlist?list=PLXooO-eTihBuvLEEP304PULUf4VIUsBy8&si=MNOL0ng7AgOZz7mO

#Red-team

Modlishka Advanced Phishing with @inf0sec1 & @noraj_rawsec

Description non disponible

https://www.youtube.com/watch?v=cBgqgZUiU5I

#Red-team

Red Teaming in the EDR age

Description non disponible

https://www.youtube.com/watch?v=l8nkXCOYQC4

#Red-team

DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Ma...

Description non disponible

https://www.youtube.com/watch?v=edIMUcxCueA

#Red-team

DEF CON 30 - Tarek Abdelmotaleb, Dr. Bramwell Brizendine - Weaponiz...

Description non disponible

https://www.youtube.com/watch?v=ME7IGHPcSKw

#Red-team

dev time

Description non disponible

https://www.youtube.com/live/xcDp6SAwC2s?si=V7rfWr0RUW0xh8kf

#Red-team

0Day Up Your Sleeve Attacking macOS Environments by Wojciech Reguła...

Description non disponible

https://www.youtube.com/watch?v=4jRFocEEX2M

#Red-team

Gemini Cyber Security

Description non disponible

https://www.youtube.com/@gemini_security/featured

#Red-team

Talent Need Not Apply: Tradecraft and Objectives of Job-themed APT ...

Description non disponible

https://www.youtube.com/watch?v=Ni1RqTwPiIQ

#Red-team

Needles Without The Thread: Threadless Process Injection - Ceri Coburn

Description non disponible

https://www.youtube.com/watch?v=z8GIjk0rfbI

#Red-team

Micah Zenko - Red Teaming Insights and Examples from Beyond - DEF C...

Description non disponible

https://www.youtube.com/watch?v=TGzMR9GfnIs

#Red-team

10. I Can See an Apple Behind Your Windows - Red Teaming macOS Envi...

Description non disponible

https://www.youtube.com/watch?v=IPFpyulNcRQ

#Red-team

2/16/22: Malware Development and NSO Group

Description non disponible

https://www.youtube.com/watch?v=d9pvNlZ9GGQ

#Red-team

PackMyPayload

GitHub repository for PackMyPayload tool.

https://github.com/mgeeky/PackMyPayload

#Red-team

Cobaltstrike-Aggressor-Scripts-Collection

GitHub repository for Cobalt Strike Aggressor Scripts Collection.

https://github.com/bytecod3r/Cobaltstrike-Aggressor-Scripts-Collection

#Red-team

Witchetty steganography espionage

Article on Witchetty steganography espionage.

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage

#Red-team

Browser in the Browser Phishing Attack

Article on Browser in the Browser Phishing Attack.

https://mrd0x.com/browser-in-the-browser-phishing-attack/

#Red-team

Freeze

GitHub repository for Freeze tool by Optiv.

https://github.com/optiv/Freeze

#Red-team

ProtectMyTooling

GitHub repository for ProtectMyTooling tool by mgeeky.

https://github.com/mgeeky/ProtectMyTooling

#Red-team

Ivy

GitHub repository for Ivy tool by Optiv.

https://github.com/optiv/Ivy

#Red-team

SigThief

GitHub repository for SigThief tool by secretsquirrel.

https://github.com/secretsquirrel/SigThief

#Red-team

LazySign

GitHub repository for LazySign tool by jfmaes.

https://github.com/jfmaes/LazySign

#Red-team

ATP PowerShell Scripts

GitHub repository for ATP PowerShell Scripts by Mr-Un1k0d3r.

https://github.com/Mr-Un1k0d3r/ATP-PowerShell-Scripts

#Red-team

DarkLoadLibrary

GitHub repository for DarkLoadLibrary tool by bats3c.

https://github.com/bats3c/DarkLoadLibrary

#Red-team

c_syscalls

GitHub repository for c_syscalls tool by janoglezcampos.

https://github.com/janoglezcampos/c_syscalls

#Red-team

ScareCrow

GitHub repository for ScareCrow tool by Optiv.

https://github.com/optiv/ScareCrow

#Red-team

Mangle

GitHub repository for Mangle tool by Optiv.

https://github.com/optiv/Mangle

#Red-team

Freeze

GitHub repository for Freeze tool by Optiv.

https://github.com/optiv/Freeze

#Red-team

Hidding Cobalt Strike Traffic

Article on hiding Cobalt Strike traffic.

https://www.tarlogic.com/blog/hidding-cobalt-strike-traffic/

#Red-team

RedWarden

GitHub repository for RedWarden tool by mgeeky.

https://github.com/mgeeky/RedWarden

#Red-team

VXUG Papers

GitHub repository for VXUG Papers by vxunderground.

https://github.com/vxunderground/VXUG-Papers/

#Red-team

maldev-for-dummies

GitHub repository for maldev-for-dummies by chvancooten.

https://github.com/chvancooten/maldev-for-dummies

#Red-team

NimPackt-v1

GitHub repository for NimPackt-v1 tool by chvancooten.

https://github.com/chvancooten/NimPackt-v1

#Red-team

OffensiveNim

GitHub repository for OffensiveNim tool by byt3bl33d3r.

https://github.com/byt3bl33d3r/OffensiveNim

#Red-team

OffensiveCSharp

GitHub repository for OffensiveCSharp tool by matterpreter.

https://github.com/matterpreter/OffensiveCSharp

#Red-team

Bypassing AV DLL Side Loading

Article on bypassing AV DLL side loading.

https://www.flangvik.com/2019/07/24/Bypassing-AV-DLL-Side-Loading.html

#Red-team

Blinding EDR On Windows

Article on blinding EDR on Windows.

https://synzack.github.io/Blinding-EDR-On-Windows/

#Red-team

Creating an EDR and Bypassing it - Part 1

Article on creating an EDR and bypassing it - Part 1.

https://ethicalchaos.dev/2020/05/27/lets-create-an-edr-and-bypass-it-part-1/

#Red-team

Ceri Coburn

Author page for Ceri Coburn on Ethical Chaos.

https://ethicalchaos.dev/author/ceri-coburn/

#Red-team

ObfLoader

GitHub repository for ObfLoader tool by D1rkMtr.

https://github.com/D1rkMtr/ObfLoader

#Red-team

Malware Development

Article on malware development on Inf0sec.

https://inf0sec.fr/article-19.php

#Red-team

Malware Development

Article on malware development on Inf0sec.

https://inf0sec.fr/article-20.php

#Red-team

CS Situational Awareness BOF

GitHub repository for CS Situational Awareness BOF tool by trustedsec.

https://github.com/trustedsec/CS-Situational-Awareness-BOF

#Red-team

Evading EDR with ScareCrow

Article on evading EDR with ScareCrow.

https://adamsvoboda.net/evading-edr-with-scarecrow/

#Red-team

ATP Portal

Mr.Un1k0d3r portal.

https://mr.un1k0d3r.com/portal

#Red-team

A tale of EDR bypass methods

Article on EDR bypass methods.

https://s3cur3th1ssh1t.github.io/A-tale-of-EDR-bypass-methods/

#Red-team

Malware Development Detection

Red Actor article on Malware Development Detection.

https://red-actor.notion.site/Malware-Development-Detection-414b4670df1c4a07bf6321540573bcca

#Red-team

ObfLoader

GitHub repository for ObfLoader tool by D1rkMtr.

https://github.com/D1rkMtr/ObfLoader

#Red-team

OtterHacker on Twitter

Tweet by OtterHacker on Twitter.

https://twitter.com/OtterHacker/status/1578412886346502145

#Red-team

Kleiton0x7e on Twitter

Tweet by Kleiton0x7e on Twitter.

https://twitter.com/kleiton0x7e/status/1578017869866016769

#Red-team

Malware Development Part 1

Article on malware development part 1.

https://0xpat.github.io/Malware_development_part_1/

#Red-team

Azure AD

Azure AD phishing link.

https://sub.msandbu.org/azuread.png

#Red-team

Windows Signed Binary

GitHub repository for Windows Signed Binary by Mr-Un1k0d3r.

https://github.com/Mr-Un1k0d3r/Windows-SignedBinary

#Red-team

Microsoft Teams Webhooks

Article on Microsoft Teams Webhooks.

https://learn.microsoft.com/en-us/microsoftteams/platform/webhooks-and-connectors/how-to/add-incoming-webhook

#Red-team

AtomPePacker

GitHub repository for AtomPePacker tool by ORCx41.

https://github.com/ORCx41/AtomPePacker

#Red-team

WAM BAM!

Article on WAM BAM! technique.

https://blog.xpnsec.com/wam-bam/

#Red-team

Alh4zr3d on Twitter

Tweet by Alh4zr3d on Twitter.

https://twitter.com/Alh4zr3d/status/1582007737847644165?t=qMOzxLzuRBQM27s59DHM_A&s=19

#Red-team

Recreating an ISO Payload for Fun

Article on recreating an ISO payload for fun.

https://blog.sunggwanchoi.com/recreating-an-iso-payload-for-fun-and-no-profit/amp/

#Red-team

Hide API Call Strings with Ordinals

Article on hiding API call strings with ordinals.

https://rioasmara.com/2020/11/15/hide-api-call-strings-with-ordinals/

#Red-team

Malware Development Part 2

Article on malware development part 2.

https://0xpat.github.io/Malware_development_part_2/

#Red-team

Tor Fronting Utilizing Hidden Services

Article on Tor fronting utilizing hidden services.

https://www.vincentyiu.com/red-team/domain-fronting/tor-fronting-utilising-hidden-services-to-hide-attack-infrastructure

#Red-team

Tor Fronting Profile

GitHub repository for Tor fronting profile by mdsecresearch.

https://github.com/mdsecresearch/Publications/blob/master/tools/redteam/malleable/tor-fronting.profile

#Red-team

Contournement des Supervisions des EDR

Article sur le contournement des supervisions des EDR.

https://connect.ed-diamond.com/misc/misc-118/techniques-de-contournement-de-la-supervision-des-edr

#Red-team

Kernel Tracing Injection Detection

Article on kernel tracing injection detection.

https://blog.redbluepurple.io/windows-security-research/kernel-tracing-injection-detection

#Red-team

DripLoader

GitHub repository for DripLoader tool by xuanxuan0.

https://github.com/xuanxuan0/DripLoader

#Red-team

Removing Kernel Callbacks Using Signed Drivers

Article on removing kernel callbacks using signed drivers.

https://br-sn.github.io/Removing-Kernel-Callbacks-Using-Signed-Drivers/

#Red-team

Tour d'horizon des mécanismes de supervision des EDR

Article sur le tour d'horizon des mécanismes de supervision des EDR.

https://connect.ed-diamond.com/misc/misc-116/tour-d-horizon-des-mecanismes-de-supervision-des-edr

#Red-team

Windows Callbacks

Article on Windows callbacks.

http://blog.deniable.org/posts/windows-callbacks/

#Red-team

Dumpert

GitHub repository for Dumpert tool by outflanknl.

https://github.com/outflanknl/Dumpert

#Red-team

EtwExplorer

GitHub repository for EtwExplorer tool by zodiacon.

https://github.com/zodiacon/EtwExplorer

#Red-team

SilkETW

GitHub repository for SilkETW tool by mandiant.

https://github.com/mandiant/SilkETW

#Red-team

Payload Download Cradles

GitHub repository for Payload Download Cradles tool by VirtualAlllocEx.

https://github.com/VirtualAlllocEx/Payload-Download-Cradles

#Red-team

Maldev: Cloning & Signing

Article on Maldev: Cloning & Signing.

https://captmeelo.com/redteam/maldev/2022/11/07/cloning-signing.html

#Red-team

AV-1

Article on AV-1.

https://enelg52.github.io/av_1.html

#Red-team

SharpCompile

GitHub repository for SharpCompile tool by SpiderLabs.

https://github.com/SpiderLabs/SharpCompile

#Red-team

NoPowerShell

GitHub repository for NoPowerShell tool by bitsadmin.

https://github.com/bitsadmin/nopowershell

#Red-team

NSO Zero-Click

Article on NSO Zero-Click by Google Project Zero.

https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html

#Red-team

0xor0ne on Twitter

Tweet by 0xor0ne on Twitter.

https://twitter.com/0xor0ne/status/1590317045073465344?t=RuemA-Zoo3KqolHb5KfdYQ&s=19

#Red-team

Spoofing Gate

GitHub repository for Spoofing Gate tool by timwhitez.

https://github.com/timwhitez/Spoofing-Gate

#Red-team

RecycledGate

GitHub repository for RecycledGate tool by thefLink.

https://github.com/thefLink/RecycledGate

#Red-team

SysWhispers2

GitHub repository for SysWhispers2 tool by jthuraisamy.

https://github.com/jthuraisamy/SysWhispers2

#Red-team

PNG Steganography

Article on PNG steganography by Avast Decoded.

https://decoded.avast.io/martinchlumecky/png-steganography/

#Red-team

Staged vs Stageless Handlers

Article on staged vs stageless handlers.

https://buffered.io/posts/staged-vs-stageless-handlers/

#Red-team

CobaltStrikeBypassDefender

GitHub repository for CobaltStrikeBypassDefender tool by Processus-Thief.

https://github.com/Processus-Thief/CobaltStrikeBypassDefender

#Red-team

SharpGmailC2

GitHub repository for SharpGmailC2 tool by reveng007.

https://github.com/reveng007/SharpGmailC2

#Red-team

CarbonCopy

GitHub repository for CarbonCopy tool by paranoidninja.

https://github.com/paranoidninja/CarbonCopy

#Red-team

Offensive Snippets

GitHub repository for Offensive Snippets by 0xAbdullah.

https://github.com/0xAbdullah/Offensive-Snippets

#Red-team

PortBender

GitHub repository for PortBender tool by praetorian-inc.

https://github.com/praetorian-inc/PortBender

#Red-team

Presentations

GitHub repository for Presentations by Octoberfest7.

https://github.com/Octoberfest7/Presentations

#Red-team

BeastArsenal

GitHub repository for BeastArsenal tool by CZashi.

https://github.com/CZashi/BeastArsenal

#Red-team

Fantastic Rootkits Part 1

Article on Fantastic Rootkits Part 1 by CyberArk.

https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1

#Red-team

cThreadHijack

GitHub repository for cThreadHijack tool by connormcgarr.

https://github.com/connormcgarr/cThreadHijack

#Red-team

Leveraging Microsoft Teams for Initial Access

Article on leveraging Microsoft Teams for initial access.

https://posts.inthecyber.com/leveraging-microsoft-teams-for-initial-access-42beb07f12c4

#Red-team

Codecepticon

GitHub repository for Codecepticon tool by Accenture.

https://github.com/Accenture/Codecepticon

#Red-team

Malware Development Part 6

Article on malware development part 6.

https://0xpat.github.io/Malware_development_part_6/

#Red-team

Red Team Tips

Article on Red Team tips.

https://www.vincentyiu.com/red-team-tips

#Red-team

VySecurity Rocks

Archive of VySecurity Rocks.

https://web.archive.org/web/20210329173433/https://vysecurity.rocks/?

#Red-team

Sharperner

GitHub repository for Sharperner tool by aniqfakhrul.

https://github.com/aniqfakhrul/Sharperner

#Red-team

DebugOff

GitHub repository for DebugOff tool by 0xor0ne.

https://github.com/0xor0ne/debugoff

#Red-team

Hiding Windows API Calls Part 1

Article on hiding Windows API calls part 1.

https://trikkss.github.io/posts/hiding_windows_api_calls_part1/

#Red-team

EDR Observations

Article on EDR observations.

https://www.signal-labs.com/blog/edr-observations

#Red-team

Automating Red Team Infrastructure with Terraform

Article on automating Red Team infrastructure with Terraform.

https://www.ired.team/offensive-security/red-team-infrastructure/automating-red-team-infrastructure-with-terraform

#Red-team

RedWarden

GitHub repository for RedWarden tool by mgeeky.

https://github.com/mgeeky/RedWarden

#Red-team

DallasFR2 on Twitter

Tweet by DallasFR2 on Twitter.

https://twitter.com/DallasFR2/status/1610717054780280834?s=20&t=EVUO2DNQoMEcT0h5s9UhsA

#Red-team

UnhookingPatch

GitHub repository for UnhookingPatch tool by D1rkMtr.

https://github.com/D1rkMtr/UnhookingPatch

#Red-team

RedGuard

GitHub repository for RedGuard tool by wikiZ.

https://github.com/wikiZ/RedGuard

#Red-team

RePulsar

GitHub repository for RePulsar tool by APT64.

https://github.com/APT64/RePulsar

#Red-team

Offensive Tools

GitHub repository for Offensive Tools by post-cyberlabs.

https://github.com/post-cyberlabs/Offensive_tools/tree/main/PostDump

#Red-team

Go Phishing

Phishing techniques and strategies.

https://tyeyeah.github.io/2022/08/06/2022-08-06-Go-Phishing/

#Red-team

Bypass Anti-Virus

Methods for bypassing antivirus software.

https://tyeyeah.github.io/2021/08/02/2021-08-02-Bypass-Anti-Virus/

#Red-team

Phishing from Scratch

Guide on creating phishing attacks from scratch.

https://www.opencyber.com/phishing-from-scratch/

#Red-team

WOW64 User APC

Exploring User APC in WOW64 architecture.

https://repnz.github.io/posts/apc/wow64-user-apc/

#Red-team

PwnAuth

GitHub repository for PwnAuth tool by mandiant.

https://github.com/mandiant/PwnAuth

#Red-team

Inline Execute PE

GitHub repository for Inline Execute PE tool by Octoberfest7.

https://github.com/Octoberfest7/Inline-Execute-PE

#Red-team

Dark Vortex Blog

Articles on various security topics.

https://0xdarkvortex.dev/blogs/

#Red-team

Hiding in Plain Sight

Techniques for hiding malicious activities.

https://0xdarkvortex.dev/hiding-in-plainsight/

#Red-team

BypassAV

GitHub repository for BypassAV tool by CMEPW.

https://github.com/CMEPW/BypassAV

#Red-team

CRTO

GitHub repository for CRTO tool by h3ll0clar1c3.

https://github.com/h3ll0clar1c3/CRTO

#Red-team

Inf0sec Article 21

Article on security topics by inf0sec.

https://inf0sec.fr/article-21.php

#Red-team

Conti Pentester Guide Leak

GitHub repository for Conti Pentester Guide Leak by ForbiddenProgrammer.

https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak

#Red-team

OperatorsKit

GitHub repository for OperatorsKit tool by REDMED-X.

https://github.com/REDMED-X/OperatorsKit

#Red-team

RedTeaming CheatSheet

GitHub repository for RedTeaming CheatSheet by 0xJs.

https://github.com/0xJs/RedTeaming_CheatSheet

#Red-team

Manage Engine PMP Passwords

How to decrypt Manage Engine PMP passwords for fun and domain admin - a red teaming tale.

https://www.shielder.com/blog/2022/09/how-to-decrypt-manage-engine-pmp-passwords-for-fun-and-domain-admin-a-red-teaming-tale/

#Red-team

Hijack Explorer Context Menu

Exploiting explorer context menu for persistence.

https://ristbs.github.io/2023/02/15/hijack-explorer-context-menu-for-persistence-and-fun.html

#Red-team

n00py1 Twitter Post

Twitter post by n00py1.

https://twitter.com/n00py1/status/1626268178803302401?t=St6HqkL1NtWMBXhfxhbPvw&s=19

#Red-team

Malware AV Evasion

Malware evasion techniques against antivirus.

https://cocomelonc.github.io/malware/2023/02/12/malware-av-evasion-11.html

#Red-team

Christbowel Red Teamer

GitHub repository for Red Teamer by Christbowel.

https://github.com/Christbowel/Red-Teamer

#Red-team

Sliver C2

Sliver C2 leveraged by many threat actors.

https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors

#Red-team

NTDLL Gadget Injection

GitHub repository for NTDLL Gadget Injection by LloydLabs.

https://github.com/LloydLabs/ntqueueapcthreadex-ntdll-gadget-injection

#Red-team

Bypass Defender

Bypassing Windows Defender techniques.

https://mrfey.fr/ARTICLES/Bypass_Defender

#Red-team

Keepass DLL Hijacking

Exploiting Keepass for DLL hijacking.

https://skr1x.github.io/keepass-dll-hijacking/

#Red-team

Spoofing Call Stacks with Timers

Behind the mask: spoofing call stacks dynamically with timers.

https://www.cobaltstrike.com/blog/behind-the-mask-spoofing-call-stacks-dynamically-with-timers/

#Red-team

Cobalt Strike Reflective Loader

Defining Cobalt Strike reflective loader.

https://securityintelligence.com/posts/defining-cobalt-strike-reflective-loader/

#Red-team

Persistence Context Menu

Persistence techniques using context menu.

https://pentestlab.blog/2023/03/13/persistence-context-menu/

#Red-team

Revisiting the UDRL

Simplifying development of Universal Distributed Reflective Loader (UDRL).

https://www.cobaltstrike.com/blog/revisiting-the-udrl-part-1-simplifying-development/

#Red-team

EgeBalci SGN

GitHub repository for SGN by EgeBalci.

https://github.com/EgeBalci/sgn

#Red-team

Lsecqt OffensiveCpp

GitHub repository for OffensiveCpp by lsecqt.

https://github.com/lsecqt/OffensiveCpp

#Red-team

DallasFR WinShellcode

GitHub repository for WinShellcode by DallasFR.

https://github.com/DallasFR/WinShellcode

#Red-team

Direct Syscalls Journey

Direct syscalls: a journey from high to low.

https://redops.at/en/blog/direct-syscalls-a-journey-from-high-to-low

#Red-team

ScareCrow

GitHub repository for ScareCrow by optiv.

https://github.com/optiv/ScareCrow

#Red-team

Acheron

GitHub repository for Acheron by f1zm0.

https://github.com/f1zm0/acheron

#Red-team

LNK Between Browsers

Linking browser processes via LNK files.

https://www.mandiant.com/resources/blog/lnk-between-browsers

#Red-team

Freeze.rs

GitHub repository for Freeze.rs by optiv.

https://github.com/optiv/Freeze.rs

#Red-team

RistBs Twitter Post

Twitter post by RistBs.

https://twitter.com/RistBs/status/1654181601775874048

#Red-team

Introducing ReSocks

Introducing ReSocks - a tool for SOCKS proxy redirection.

https://blog.redteam-pentesting.de/2023/introducing-resocks/

#Red-team

The Dangers of Google's .ZIP TLD

Security risks associated with Google's .ZIP top-level domain.

https://medium.com/@bobbyrsec/the-dangers-of-googles-zip-tld-5e1e675e59a5

#Red-team

AVDebugger

GitHub repository for AVDebugger by scrt.

https://github.com/scrt/avdebugger

#Red-team

Dr4k0nia Blog

Articles on various security topics.

https://dr4k0nia.github.io/

#Red-team

UnhookingPatch

GitHub repository for UnhookingPatch by TheD1rkMtr.

https://github.com/TheD1rkMtr/UnhookingPatch

#Red-team

Awesome EDR Bypass

Curated list of awesome EDR bypass resources.

https://github.com/tkmru/awesome-edr-bypass

#Red-team

Unleashing the Unseen

Harnessing the power of Cobalt Strike profiles for EDR evasion.

https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/

#Red-team

Direct Syscalls vs Indirect Syscalls

Comparing direct syscalls and indirect syscalls.

https://redops.at/en/blog/direct-syscalls-vs-indirect-syscalls

#Red-team

RemotePatcher

GitHub repository for RemotePatcher by Hagrid29.

https://github.com/Hagrid29/RemotePatcher

#Red-team

LethalHTA

GitHub repository for LethalHTA by codewhitesec.

https://github.com/codewhitesec/LethalHTA

#Red-team

BOFs

GitHub repository for BOFs by ajpc500.

https://github.com/ajpc500/BOFs

#Red-team

Make Phishing Great Again

Using VSTO Office files for phishing - the new macro nightmare.

https://medium.com/@airlockdigital/make-phishing-great-again-vsto-office-files-are-the-new-macro-nightmare-e09fcadef010

#Red-team

LockScream

GitHub repository for LockScream by BlacksunLabs.

https://github.com/BlacksunLabs/LockScream

#Red-team

Introduction to Malware

Introduction to malware analysis and evasion techniques.

https://otterhacker.github.io/Malware/Introduction/0%20-%20Introduction.html

#Red-team

Building a Red Team Infrastructure

Guide on building a red team infrastructure in 2023.

https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/

#Red-team

Red Team Infrastructure Done Right

Tips for setting up red team infrastructure.

https://notes.huskyhacks.dev/blog/red-team-infrastructure-done-right

#Red-team

Process Injection Without WIN32API

La Hack: Process injection without the standard WIN32API.

https://github.com/OtterHacker/Conferences/blob/main/La%20Hack%20-%20Process%20Injection%20Without%20the%20standard%20WIN32API.pdf

#Red-team

Red Team Guide

Comprehensive guide to red teaming techniques and tools.

https://redteam.guide/

#Red-team

VX-API

GitHub repository for VX-API by vxunderground.

https://github.com/vxunderground/VX-API

#Red-team

HellShell

GitHub repository for HellShell by NUL0x4C.

https://github.com/NUL0x4C/HellShell

#Red-team

Cat Mouse or Chess

Blog post about Cat, Mouse, or Chess.

https://s3cur3th1ssh1t.github.io/Cat_Mouse_or_Chess/

#Red-team

Malware Tricks 34

Malware evasion tricks and techniques.

https://cocomelonc.github.io/malware/2023/07/07/malware-tricks-34.html

#Red-team

Uncovering Windows Events

Exploring Windows event log monitoring.

https://jsecurity101.medium.com/uncovering-windows-events-b4b9db7eac54

#Red-team

Design Issues of Modern EDRs

Analysis of design issues in modern EDRs and bypass techniques.

https://www.binarly.io/posts/Design_issues_of_modern_EDRs_bypassing_ETW-based_solutions/index.html

#Red-team

WTSRM

GitHub repository for WTSRM by rad9800.

https://github.com/rad9800/WTSRM

#Red-team

Build a Phish

GitHub repository for Build a Phish by ralphte.

https://github.com/ralphte/build_a_phish

#Red-team

Red Team Tips

GitHub repository for Red Team Tips by 6vr.

https://github.com/6vr/Red-Team-Tips

#Red-team

Antivirus Evasion

Techniques for evading antivirus detection.

https://redfoxsecurity.medium.com/antivirus-evasion-26a30f072f76

#Red-team

Evasion Practice

GitHub repository for Evasion Practice by cinzinga.

https://github.com/cinzinga/Evasion-Practice

#Red-team

Hookbot Source

GitHub repository for Hookbot Source by 0xperator.

https://github.com/0xperator/hookbot_source

#Red-team

HardHatC2

GitHub repository for HardHatC2 by DragoQCC.

https://github.com/DragoQCC/HardHatC2

#Red-team

Hook, Line, and Phishlet

Phishing techniques using hooks.

https://research.aurainfosec.io/pentest/hook-line-and-phishlet/

#Red-team

Sevagas Blog

Articles on various security topics.

https://blog.sevagas.com/

#Red-team

OSEP Breaking Chains

GitHub repository for OSEP Breaking Chains by gh0x0st.

https://github.com/gh0x0st/OSEP-Breaking-Chains

#Red-team

CSSHide

GitHub repository for CSSHide by inb1ts.

https://github.com/inb1ts/CSSHide

#Red-team

New Tool: CSSHide

Introduction to CSSHide tool.

https://inbits-sec.com/posts/new-tool-csshide/

#Red-team

s6_pcie_microblaze

GitHub repository for s6_pcie_microblaze by Cr4sh.

https://github.com/Cr4sh/s6_pcie_microblaze

#Red-team

Okta for Red Teamers

Using Okta for red teaming activities.

https://www.trustedsec.com/blog/okta-for-red-teamers/

#Red-team

Aggressor Scripts

GitHub repository for Aggressor Scripts by harleyQu1nn.

https://github.com/harleyQu1nn/AggressorScripts

#Red-team

Reflective Ntdll

GitHub repository for Reflective Ntdll by reveng007.

https://github.com/reveng007/ReflectiveNtdll

#Red-team

Red Tips

GitHub repository for Red Tips by vysecurity.

https://github.com/vysecurity/RedTips

#Red-team

In-Memory Unhooking

Techniques for in-memory unhooking.

https://inbits-sec.com/posts/in-memory-unhooking/

#Red-team

Red Team Notes 2.0

Red teaming notes and techniques.

https://dmcxblue.gitbook.io/red-team-notes-2-0/

#Red-team

AlternativeShellcodeExec

GitHub repository for AlternativeShellcodeExec by aahmad097.

https://github.com/aahmad097/AlternativeShellcodeExec

#Red-team

How to Argue Like Cobalt Strike

Debating the effectiveness of Cobalt Strike.

https://blog.xpnsec.com/how-to-argue-like-cobalt-strike/

#Red-team

Filter Mute Operation

Investigating EDR internal communication.

https://sensepost.com/blog/2023/filter-mute-operation-investigating-edr-internal-communication/

#Red-team

Endpoint Detection and Response for Dummies

Introduction to EDR concepts.

https://blog.maikxchd.com/endpoint-detection-and-response-for-dummies

#Red-team

CheekyBlinder

GitHub repository for CheekyBlinder by br-sn.

https://github.com/br-sn/CheekyBlinder

#Red-team

EDRSandblast GodFault

Analysis of EDR Sandblast and GodFault.

https://github.com/gabriellandau/EDRSandblast-GodFault

#Red-team

Secure Hat Blog

Articles on security by securehat.

https://blog.securehat.co.uk/

#Red-team

Resolving System Service Numbers

Using the Exception Directory for resolving system service numbers.

https://www.mdsec.co.uk/2022/04/resolving-system-service-numbers-using-the-exception-directory/

#Red-team

HellsGate

GitHub repository for HellsGate by am0nsec.

https://github.com/am0nsec/HellsGate

#Red-team

AV Evasion: NoSysWhisper

Evasion technique using NoSysWhisper.

https://klezvirus.github.io/RedTeaming/AV_Evasion/NoSysWhisper/

#Red-team

Recycled Injector

GitHub repository for Recycled Injector by florylsk.

https://github.com/florylsk/RecycledInjector

#Red-team

HandleKatz

GitHub repository for HandleKatz by codewhitesec.

https://github.com/codewhitesec/handlekatz

#Red-team

TartarusGate

GitHub repository for TartarusGate by trickster0.

https://github.com/trickster0/TartarusGate

#Red-team

Direct Syscalls

Exploring direct syscalls.

https://evasions.checkpoint.com/

#Red-team

ClickOnce for Initial Access

Backdooring ClickOnce.NET for initial access.

https://infosecwriteups.com/backdooring-clickonce-net-for-initial-access-a-practical-example-1eb6863c0579

#Red-team

Handle Grant Access

GitHub repository for Handle Grant Access by FiYHer.

https://github.com/FiYHer/handle_grant_access

#Red-team

DEFCON-31 Syscalls Workshop

Materials from DEFCON-31 Syscalls Workshop.

https://github.com/VirtualAlllocEx/DEFCON-31-Syscalls-Workshop

#Red-team

pyMalleableC2

GitHub repository for pyMalleableC2 by byt3bl33d3r.

https://github.com/byt3bl33d3r/pyMalleableC2

#Red-team

Home-Grown Red Team LNK Phishing

Revisiting LNK phishing in 2023.

https://assume-breach.medium.com/home-grown-red-team-lnk-phishing-revisited-in-2023-364daf70a06a

#Red-team

Bypassing Windows SmartScreen

Techniques for bypassing Windows SmartScreen.

https://www.gironsec.com/blog/2020/12/bypassing-windows-smartscreen/

#Red-team

Less SmartScreen, More Caffeine

Using ClickOnce for trusted code execution.

https://posts.specterops.io/less-smartscreen-more-caffeine-ab-using-clickonce-for-trusted-code-execution-1446ea8051c5

#Red-team

BOF Template

GitHub repository for BOF Template by Cobalt-Strike.

https://github.com/Cobalt-Strike/bof_template

#Red-team

InjectOpi

GitHub repository for InjectOpi by peperunas.

https://github.com/peperunas/injectopi

#Red-team

SharpDllProxy

GitHub repository for SharpDllProxy by Flangvik.

https://github.com/Flangvik/SharpDllProxy

#Red-team

Brute Ratel C4 Tool

Exploring the Brute Ratel C4 tool.

https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/

#Red-team

Recreating an ISO Payload

Creating an ISO payload for testing.

https://blog.sunggwanchoi.com/recreating-an-iso-payload-for-fun-and-no-profit/

#Red-team

DotNetToJScript

GitHub repository for DotNetToJScript by tyranid.

https://github.com/tyranid/DotNetToJScript

#Red-team

Entropy Reducer

GitHub repository for Entropy Reducer by Maldev-Academy.

https://github.com/Maldev-Academy/EntropyReducer

#Red-team

Finding Lolbins in AV Uninstallers

Finding LOLBins in AV uninstallers.

https://nasbench.medium.com/lolbined-finding-lolbins-in-av-uninstallers-bf29427d3cd8

#Red-team

ClickOnce Droppers

Investigating ClickOnce droppers.

https://www.bordergate.co.uk/clickonce-droppers/

#Red-team

One-Click to Compromise

Using one-click techniques for compromise.

https://blog.redxorblue.com/2020/07/one-click-to-compromise-fun-with.html

#Red-team

CatMyPhish

GitHub repository for CatMyPhish by Mr-Un1k0d3r.

https://github.com/Mr-Un1k0d3r/CatMyPhish

#Red-team

All You Need is One: A ClickOnce Love Story

Using ClickOnce for attacks.

https://www.netspi.com/blog/technical/adversary-simulation/all-you-need-is-one-a-clickonce-love-story/

#Red-team

Malicious ClickOnce Generator

GitHub repository for Malicious ClickOnce Generator by Mr-Un1k0d3r.

https://github.com/Mr-Un1k0d3r/MaliciousClickOnceGenerator

#Red-team

Ninjasploit

GitHub repository for Ninjasploit by FSecureLABS.

https://github.com/FSecureLABS/Ninjasploit

#Red-team

Packed Binaries

Analysis of packed binaries.

https://dplastico.github.io/sin%20categor%C3%ADa/2022/04/21/packed-binaries.html

#Red-team

New Packing Method: Reflective PE Packer

Introduction to a new packing method for reflective PE.

https://pentest.blog/introducing-new-packing-method-first-reflective-pe-packer/

#Red-team

Making Our Own Executable Packer

Series on making an executable packer.

https://fasterthanli.me/series/making-our-own-executable-packer

#Red-team

Training

Courses on various security topics.

https://codemachine.com/training.html

#Red-team

Awesome Red Team Cheatsheet

GitHub repository for Awesome Red Team Cheatsheet by RistBS.

https://github.com/RistBS/Awesome-RedTeam-Cheatsheet/blob/master/Miscs/Malware%20Development.md

#Red-team

Preempt Blog

Articles on preemptive security.

https://pre.empt.blog/

#Red-team

Home-Grown Red Team LNK Phishing in 2023 Revisited

Revisiting LNK phishing in 2023.

https://assume-breach.medium.com/home-grown-red-team-lnk-phishing-in-2023-revisited-again-2b8c885b9836

#Red-team

PPLFault

GitHub repository for PPLFault by gabriellandau.

https://github.com/gabriellandau/PPLFault

#Red-team

Writing a PE Packer: Intro

Tutorial on writing a PE packer.

https://wirediver.com/tutorial-writing-a-pe-packer-intro/

#Red-team

R2R: Stomping

Are you ready to run? R2R stomp.

https://research.checkpoint.com/2023/r2r-stomping-are-you-ready-to-run/

#Red-team

Forget Vulnerable Drivers

Security implications of vulnerable drivers.

https://www.elastic.co/security-labs/forget-vulnerable-drivers-admin-is-all-you-need

#Red-team

Offensive C

GitHub repository for Offensive C by Reijaff.

https://github.com/Reijaff/offensive_c

#Red-team

Malware Development and TTPs

Malware development and tactics, techniques, and procedures.

https://chrollo-dll.gitbook.io/chrollo/security-blogs/malware-development-and-ttps

#Red-team

Evasion Concepts Primer

Primer on evasion concepts.

https://7h3w4lk3rs-organization.gitbook.io/the-hive/malware-development/evasion-concepts-primer

#Red-team

Malware Projects

GitHub repository for Malware Projects by 0xBinarySl3uth.

https://github.com/0xBinarySl3uth/Malware-Projects

#Red-team

Hypervisor Detection with SystemHypervisorDetailInformation

Detecting hypervisors using SystemHypervisorDetailInformation.

https://medium.com/@matterpreter/hypervisor-detection-with-systemhypervisordetailinformation-26e44a57f80e

#Red-team

Red Team Code Snippets

GitHub repository for Red Team Code Snippets by 0xTriboulet.

https://github.com/0xTriboulet/Red_Team_Code_Snippets

#Red-team

DLL Notification Injection

Exploring DLL notification injection.

https://shorsec.io/blog/dll-notification-injection/

#Red-team

Shellcode Template

GitHub repository for Shellcode Template by Cracked5pider.

https://github.com/Cracked5pider/ShellcodeTemplate

#Red-team

Data

GitHub repository for Data by aptnotes.

https://github.com/aptnotes/data

#Red-team

Sysplant

GitHub repository for Sysplant by x42en.

https://github.com/x42en/sysplant

#Red-team

Presentation Slides

Presentation slides on various security topics.

https://drive.google.com/file/d/1cP3eVLrPsBS8RQWmSsnzgudpiqwcVoyf/view

#Red-team

Heaven's Gate Technique on Linux

Exploring Heaven's Gate technique on Linux.

https://redcanary.com/blog/heavens-gate-technique-on-linux/

#Red-team

Learning EDR and EDR Evasion

GitHub repository for Learning EDR and EDR Evasion by reveng007.

https://github.com/reveng007/Learning-EDR-and-EDR_Evasion

#Red-team

ClickonceHunter

GitHub repository for ClickonceHunter by zyn3rgy.

https://github.com/zyn3rgy/ClickonceHunter

#Red-team

DLL Sideloading

Exploring DLL sideloading.

https://crypt0ace.github.io/posts/DLL-Sideloading/

#Red-team

D-Pwn

GitHub repository for D-Pwn by FatCyclone.

https://github.com/FatCyclone/D-Pwn

#Red-team

NovaLdr

GitHub repository for NovaLdr by BlackSnufkin.

https://github.com/BlackSnufkin/NovaLdr

#Red-team

Using EDR Telemetry for Offensive Research

Exploring the use of EDR telemetry for offensive research.

https://atos.net/en/lp/securitydive/using-edr-telemetry-for-offensive-research

#Red-team

Advanced Process Injection Workshop

Workshop materials on advanced process injection techniques.

https://github.com/RedTeamOperations/Advanced-Process-Injection-Workshop

#Red-team

Phishing with Dynamite

Strategies and tactics for aggressive phishing campaigns.

https://medium.com/@fakasler/phishing-with-dynamite-7d33d8fac038

#Red-team

Red Teaming Tactics: Custom Staged Payloads w/ Metasploit

Techniques for creating and deploying custom staged payloads with Metasploit.

https://medium.com/@nickswink7/red-teaming-tactics-unlocking-the-power-of-custom-staged-payloads-w-metasploit-d3db71567572

#Red-team

Combining Indirect Dynamic Syscalls and API Hashing

Exploring the combination of indirect dynamic syscalls and API hashing.

https://labs.cognisys.group/posts/Combining-Indirect-Dynamic-Syscalls-and-API-Hashing/

#Red-team

Beyond

Exploring advanced offensive security techniques.

https://theevilbit.github.io/beyond/

#Red-team

Bypass TCC via iCloud

Methods for bypassing macOS TCC restrictions using iCloud.

https://wojciechregula.blog/post/bypass-tcc-via-icloud/

#Red-team

Attacking an EDR Part 3

Advanced techniques for attacking EDR solutions - Part 3.

https://riccardoancarani.github.io/2023-11-07-attacking-an-edr-part-3/

#Red-team

Red Teams BYOR Technique

Techniques and strategies for Red Teams using Build Your Own Recon (BYOR) approach.

https://blogs.pivotsec.in/red-teams-byor-technique/

#Red-team

OffensiveGo

Tools and resources for offensive security research in Go programming language.

https://github.com/Enelg52/OffensiveGo

#Red-team

Code C2

Exploring Command and Control (C2) frameworks and their code.

https://badoption.eu/blog/2023/01/31/code_c2.html

#Red-team

C2 Attacking an EDR Part 1

Strategies and techniques for attacking EDR solutions - Part 1.

https://her0ness.github.io/2023-08-03-c2-Attacking-an-EDR-Part-1/

#Red-team

DoublePulsar Usermode Injector

Tools and techniques for injecting DoublePulsar into usermode.

https://github.com/WithSecureLabs/doublepulsar-usermode-injector

#Red-team

GD Thief

Tool for stealing Google account data.

https://github.com/antman1p/GD-Thief

#Red-team

Conf Thief

Tool for stealing configuration data.

https://github.com/antman1p/Conf-Thief

#Red-team

Best EDR Of The Market

Exploring the best EDR solutions available on the market.

https://xacone.github.io/BestEdrOfTheMarket.html

#Red-team

CrossC2

Exploring cross-platform Command and Control (C2) frameworks.

https://github.com/gloxec/CrossC2

#Red-team

Objective-See Blog 0x4F

Insights and research from Objective-See on macOS security.

https://objective-see.org/blog/blog_0x4F.html

#Red-team

Objective-See Blog 0x64

Insights and research from Objective-See on macOS security.

https://objective-see.org/blog/blog_0x64.html

#Red-team

What Does APT Activity Look Like on macOS?

Insights into Advanced Persistent Threat (APT) activity on macOS.

https://themittenmac.com/what-does-apt-activity-look-like-on-macos/

#Red-team

Gatekeeper Bypass

Techniques and strategies for bypassing macOS Gatekeeper security.

https://redcanary.com/threat-detection-report/techniques/gatekeeper-bypass/

#Red-team

Gatekeeper Exposed

Research and insights into vulnerabilities in macOS Gatekeeper.

https://archive.org/details/Gatekeeper_Exposed

#Red-team

Objective-See Blog 0x49

Insights and research from Objective-See on macOS security.

https://objective-see.org/blog/blog_0x49.html

#Red-team

macOS Red Teaming: Bypass TCC with Old Apps

Techniques for bypassing macOS Transparency, Consent, and Control (TCC) with old apps.

https://wojciechregula.blog/post/macos-red-teaming-bypass-tcc-with-old-apps/

#Red-team

CVE-2023-26818 macOS TCC Bypass with Telegram using Dylib Injection Part 1

Exploiting CVE-2023-26818 to bypass macOS TCC using Dylib Injection with Telegram.

https://www.vicarius.io/vsociety/posts/cve-2023-26818-macos-tcc-bypass-with-telegram-using-dylib-injection-part1

#Red-team

macOS Red Teaming 211: Dylib Hijacking

Techniques and methods for Dylib Hijacking on macOS.

http://lockboxx.blogspot.com/2019/10/macos-red-teaming-211-dylib-hijacking.html?m=1

#Red-team

Dylib Hijacking on OS X

Understanding and exploiting Dylib Hijacking vulnerabilities on OS X.

https://www.virusbulletin.com/virusbulletin/2015/03/dylib-hijacking-os-x

#Red-team

EmPyre

The EmPyre project for post-exploitation on Windows and Linux systems.

https://github.com/EmpireProject/EmPyre

#Red-team

DylibHijackScanner

A tool to scan for Dylib Hijacking vulnerabilities on macOS.

https://github.com/objective-see/DylibHijackScanner

#Red-team

CVE-2023-32407 macOS TCC Bypass (Lateralus)

Exploiting CVE-2023-32407 to bypass macOS TCC restrictions (Lateralus technique).

https://gergelykalman.com/lateralus-CVE-2023-32407-a-macos-tcc-bypass.html

#Red-team

CVE-2023-32422 macOS TCC Bypass (SQLol)

Exploiting CVE-2023-32422 to bypass macOS TCC restrictions (SQLol technique).

https://gergelykalman.com/sqlol-CVE-2023-32422-a-macos-tcc-bypass.html

#Red-team

PoolParty

Tools and techniques for process injection and evasion.

https://github.com/SafeBreach-Labs/PoolParty

#Red-team

A Beginner's Guide to EDR Evasion

Introduction to evading Endpoint Detection and Response (EDR) systems.

https://kylemistele.medium.com/a-beginners-guide-to-edr-evasion-b98cc076eb9a

#Red-team

New PoolParty Process Injection Technique

Exploring new process injection techniques with PoolParty.

https://thehackernews.com/2023/12/new-poolparty-process-injection.html

#Red-team

Process Injection Using Windows Thread Pools

Techniques for injecting code using Windows Thread Pools.

https://www.safebreach.com/blog/process-injection-using-windows-thread-pools

#Red-team

GhostDriver

Tools and techniques for GhostDriver automation.

https://github.com/BlackSnufkin/GhostDriver

#Red-team

ClickOnce AppDomain Manager Injection

Techniques for injecting code using ClickOnce AppDomain Manager.

https://github.com/weaselsec/ClickOnce-AppDomain-Manager-Injection

#Red-team

Phishing Infrastructures

Building phishing infrastructures for cyber operations.

https://badoption.eu/blog/2023/12/03/PhishingInfra.html

#Red-team

Shaco

Tools and techniques for manipulating system interactions.

https://github.com/souzomain/Shaco

#Red-team

Mortar Loader

Exploring the Mortar Loader for cyber operations.

https://kpmg.com/nl/en/home/insights/2023/12/mortar-loader.html

#Red-team

Nidhogg

Tools and techniques for interacting with system processes.

https://github.com/Idov31/Nidhogg

#Red-team

CLR Heap Encryption

Exploring heap encryption techniques in .NET.

https://github.com/lap1nou/CLR_Heap_encryption

#Red-team

Visual Studio DCOM

Understanding DCOM (Distributed Component Object Model) in Visual Studio.

https://adepts.of0x.cc/visual-studio-dcom/

#Red-team

NecroBrowser

Tools and techniques for exploring browsers remotely.

https://github.com/muraenateam/necrobrowser

#Red-team

PhoneSearch

Exploring techniques for searching phone numbers.

https://phonesearch.gofyeo.com/

#Red-team

0t.rocks Search

Exploring search capabilities on 0t.rocks.

https://search.0t.rocks/

#Red-team

Creating an Opsec-Safe Loader for Red Team Operations

Strategies for creating an opsec-safe loader for Red Team operations.

https://labs.nettitude.com/blog/creating-an-opsec-safe-loader-for-red-team-operations/

#Red-team

ByteViper: Next-Gen Malwares

Exploring next-generation malwares with ByteViper.

https://ghost-pepper.gitbook.io/byte-viper/next-gen-malwares/byteviper

#Red-team

Croc in the Middle

Understanding the Croc in the Middle attack.

https://hackmag.com/security/croc-in-the-middle/

#Red-team

InvisibilityCloak

Tools and techniques for achieving invisibility in cyber operations.

https://github.com/h4wkst3r/InvisibilityCloak

#Red-team

Detection Alchemy: The Purple Team Way

Approaches to detection and mitigation in the Purple Team methodology.

https://trustedsec.com/blog/detection-alchemy-the-purple-team-way

#Red-team

Objective-See Blog 0x77

Insights and research from Objective-See on macOS security.

https://objective-see.org/blog/blog_0x77.html

#Red-team

Crafting Malicious Pluggable Authentication Modules for Persistence, Privilege Escalation, and Later

Creating and deploying malicious Pluggable Authentication Modules (PAMs) for cyber operations.

https://rosesecurityresearch.com/crafting-malicious-pluggable-authentication-modules-for-persistence-privilege-escalation-and-lateral-movement

#Red-team

Bitwarden Heist

In-depth analysis of the Bitwarden Heist cyber incident.

https://blog.redteam-pentesting.de/2024/bitwarden-heist/

#Red-team

PInvoke

A collection of PInvoke code snippets and examples.

https://www.pinvoke.dev/

#Red-team

Bring Your Own Interpreter

Exploring the concept of bringing your own interpreter for Red Team operations.

https://synzack.github.io/Bring-Your-Own-Interpreter/

#Red-team

EDRSilencer

Tools and techniques for silencing Endpoint Detection and Response (EDR) systems.

https://github.com/netero1010/EDRSilencer

#Red-team

Phishing Microsoft Teams for Initial Access

Strategies and techniques for phishing attacks targeting Microsoft Teams.

https://pushsecurity.com/blog/phishing-microsoft-teams-for-initial-access/

#Red-team

Presentations

Collection of Red Team presentations and talks.

https://github.com/outflanknl/Presentations

#Red-team

XLL-DROPPER

Tools and techniques for using XLL-DROPPER.

https://github.com/EvilGreys/XLL-DROPPER-

#Red-team

Leveraging Fake DLLs, Guard Pages, and VEh for Enhanced Detection

Techniques for enhancing detection using fake DLLs, guard pages, and Virtual Exception Handlers (VEh).

https://redops.at/en/blog/leveraging-fake-dlls-guard-pages-and-veh-for-enhanced-detection

#Red-team

GraphStrike

GraphStrike tool for Red Teaming operations.

https://github.com/RedSiege/GraphStrike

#Red-team

GraphStrike Developer Insights

Insights from the developers of GraphStrike.

https://redsiege.com/blog/2024/01/graphstrike-developer/

#Red-team

JS Tap: Weaponizing JavaScript for Red Teams

Techniques for weaponizing JavaScript in Red Team operations.

https://trustedsec.com/blog/js-tap-weaponizing-javascript-for-red-teams

#Red-team

Automating C2 Infrastructure with Terraform, Nebula, Caddy, and Cobalt Strike

Automation techniques for C2 infrastructure using Terraform, Nebula, Caddy, and Cobalt Strike.

https://blog.malicious.group/automating-c2-infrastructure-with-terraform-nebula-caddy-and-cobalt-strike/

#Red-team

Automating C2 Infrastructure with Terraform, Nebula, Caddy, and Cobalt Strike (Duplicate)

Automation techniques for C2 infrastructure using Terraform, Nebula, Caddy, and Cobalt Strike.

https://blog.malicious.group/automating-c2-infrastructure-with-terraform-nebula-caddy-and-cobalt-strike/

#Red-team

A Super Easy Way to Get an Unhooked Copy (LinkedIn)

LinkedIn post discussing obtaining an unhooked copy.

https://www.linkedin.com/posts/malwaretech_a-super-easy-way-to-get-an-unhooked-copy-activity-7160688970530488320-YPKh?utm_source=share&utm_medium=member_android

#Red-team

Active Directory Enumeration for Red Teams

Techniques and tools for Active Directory enumeration in Red Team operations.

https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/

#Red-team

Cheatsheet

Collection of Red Team cheatsheets.

https://cheatsheet.haax.fr/

#Red-team

Mail in the Middle: A Tool to Automate Spear Phishing Campaigns

Automation tool for spear phishing campaigns.

https://sensepost.com/blog/2024/mail-in-the-middle-a-tool-to-automate-spear-phishing-campaigns/

#Red-team

Linux Red Team Persistence Techniques

Techniques for achieving persistence in Linux Red Team operations.

https://www.linode.com/docs/guides/linux-red-team-persistence-techniques/

#Red-team

Code Injection on macOS

Understanding and executing code injection techniques on macOS.

https://knight.sc/malware/2019/03/15/code-injection-on-macos.html

#Red-team

MacOS X

Exploring macOS X security features and vulnerabilities.

https://0xf00sec.github.io/2024/03/09/MacOs-X.html

#Red-team

Justas Masiulis Twitter Post

Twitter post discussing cybersecurity and hacking.

https://twitter.com/JustasMasiulis/status/1764171634469122165

#Red-team

RedTeamScripts

Collection of Red Team scripts and tools.

https://github.com/api0cradle/RedTeamScripts

#Red-team

WiFiPumpkin

Tools and techniques for WiFi penetration testing.

https://wifipumpkin3.github.io/

#Red-team

OSEP

Offensive Security Exploitation Professional (OSEP) resources.

https://github.com/In3x0rabl3/OSEP/tree/main

#Red-team

SigFlip

Exploring SigFlip evasion techniques and bypassing Authenticode.

https://github.com/med0x2e/SigFlip

#Red-team

SigFlip Evasion: Bypass Authenticode (Rio Asmara)

Rio Asmara's blog post on SigFlip evasion.

https://rioasmara.com/2023/04/09/sigflip-evasion-bypass-authenticode/

#Red-team

LOLDrivers

Tools and techniques for utilizing LOLDrivers.

https://github.com/yardenshafir/LOLDrivers

#Red-team

SSTIC 2017: Désobfuscation binaire : Reconstruction de fonctions vi...

Conférence SSTIC 2017 sur la désobfuscation binaire et la reconstruction de fonctions.

https://www.youtube.com/watch?v=C_Pece5mJto

#Reverse

Hacking Livestream #81: Reverse engineering a VM-based protection

Livestream sur le reverse engineering d'une protection basée sur une machine virtuelle.

https://www.youtube.com/watch?v=nKhX0Pk3a5A

#Reverse

[WEBINAIRE] ESD academy - Techniques de hacking avancées

Webinaire de l'ESD academy sur les techniques avancées de hacking.

https://www.youtube.com/watch?v=BEsPHK-XGEA

#Reverse

Hacking Livestream #61: Nanomites

Livestream sur Nanomites dans le contexte du hacking.

https://www.youtube.com/watch?v=XEX_RNVHcgY

#Reverse

LaurieWired

Chaîne YouTube de LaurieWired avec diverses vidéos sur la sécurité informatique.

https://www.youtube.com/@lauriewired/videos

#Reverse

DCG937 July Meeting: Reverse Engineering C# and Modifying Unity3D G...

Réunion de juillet du DCG937 sur le reverse engineering C# et la modification de jeux Unity3D.

https://www.youtube.com/watch?v=nTZRhG6-yW8

#Reverse

Symbolic Execution Demystified by Jannis Kirschner

Conférence sur la Symbolic Execution par Jannis Kirschner.

https://www.youtube.com/watch?v=gudLFiK0x5I

#Reverse

#HITB2021AMS D1T2 - When Qiling Framework Meets Symbolic Execution ...

Conférence HITB2021AMS sur la rencontre entre le framework Qiling et la Symbolic Execution.

https://www.youtube.com/watch?v=8omtif6CnnY

#Reverse

How To Recognize Macro Encrypted Strings in Malware

Guide sur la reconnaissance des chaînes chiffrées en macro dans les malwares.

https://www.youtube.com/watch?v=fEAGYjhKzJY

#Reverse

DuMp-GuY TrIcKsTeR

Chaîne YouTube de DuMp-GuY TrIcKsTeR avec diverses vidéos sur la sécurité informatique.

https://www.youtube.com/@DuMpGuYTrIcKsTeR/featured

#Reverse

Helping Reverse Engineering with LLVM, Lionel Auroux, LSE Week 2013

Conférence sur l'aide au reverse engineering avec LLVM, par Lionel Auroux lors de la LSE Week 2013.

https://www.youtube.com/watch?v=NYMgCnJE9rY

#Reverse

Play with bruteratel framework payload

Vidéo sur l'utilisation de bruteratel framework pour les payloads.

https://www.youtube.com/watch?v=4UBFcJ6Ap7c&start=862

#Reverse

Debugging Optimized x64 Code

Guide sur le débogage de code x64 optimisé.

https://www.youtube.com/watch?v=MUNRvqpske0

#Reverse

Zero to Hero: The process of reversing and exploiting complex vulne...

Guide sur le processus de reverse engineering et d'exploitation de vulnérabilités complexes.

https://www.youtube.com/watch?v=7ySes8NCt78

#Reverse

Comment décoder des Opcodes Partie 2 - MOD R/M - Byte Displacement

Tutoriel sur le décodage des opcodes, partie 2.

https://www.youtube.com/watch?v=vldAvlsLHrU

#Reverse

HackSecuReims 2020 - Anatomie et méthodologie d’une réponse à incid...

Conférence HackSecuReims 2020 sur l'anatomie et la méthodologie des réponses à incident.

https://www.youtube.com/watch?v=MTSE_ktGuOc

#Reverse

Let's Reverse Engineer: Flare-On 2023 Challenges 1–4

Guide sur le reverse engineering des défis Flare-On 2023.

https://www.youtube.com/watch?v=wpHMVMkcvpI

#Reverse

Comment décoder des Opcodes Partie 1 - 1 Length && MOD R/M - Regist...

Tutoriel sur le décodage des opcodes, partie 1.

https://www.youtube.com/watch?v=0GcrWchPleU

#Reverse

Malware Analysis In 5+ Hours - Full Course - Learn Practical Malwar...

Cours complet d'analyse de malwares en plus de 5 heures.

https://www.youtube.com/watch?v=qA0YcYMRWyI

#Reverse

Frida Hooking Tutorial - Android Game Hacking

Guide sur l'utilisation de Frida pour le hooking sur Android.

https://www.youtube.com/watch?v=GWgr0xk8DTM

#Reverse

Invoke RE

Chaîne YouTube de Invoke RE avec diverses vidéos sur le reverse engineering.

https://www.youtube.com/@InvokeReversing/videos

#Reverse

OALabs

Chaîne YouTube de OALabs avec diverses vidéos sur le reverse engineering et l'analyse de malwares.

https://www.youtube.com/c/OALabs/videos

#Reverse

Reversing WannaCry Part 1 - Finding the killswitch and unpacking th...

Guide sur le reverse engineering de WannaCry, partie 1.

https://www.youtube.com/watch?v=Sv8yu12y5zM

#Reverse

Reverse Engineering Ubuntu 22.04 Crash For Beginners

Guide pour débutants sur le reverse engineering d'un crash sur Ubuntu 22.04.

https://www.youtube.com/watch?v=_o1NyYQLec0

#Reverse

Controlling your Angr : Techniques for improving Symbolic Execution...

Techniques pour améliorer l'exécution symbolique avec Angr.

https://www.youtube.com/watch?v=4yPmdJj18to

#Reverse

Reversing Malware How is APT 29 Successful w/ this Phishing Tech an...

Guide sur le reverse engineering des malwares utilisés par APT 29 pour des attaques de phishing.

https://www.youtube.com/watch?v=a7W6rhkpVSM

#Reverse

HACKADAY

Chaîne YouTube de HACKADAY avec diverses vidéos sur la sécurité informatique.

https://www.youtube.com/@hackaday/playlists

#Reverse

cazz

Chaîne YouTube de cazz avec diverses vidéos sur la sécurité informatique.

https://www.youtube.com/@cazz/

#Reverse

Self-Learning Reverse Engineering in 2022

Guide sur l'auto-apprentissage du reverse engineering en 2022.

https://www.youtube.com/watch?v=gPsYkV7-yJk

#Reverse

Reverse Engineering/Game Patching Tutorial: Full Res Roller Coaster...

Tutoriel sur le reverse engineering et le patching de jeux, en haute résolution.

https://www.youtube.com/watch?v=cwBoUuy4nGc

#Reverse

Introduction au reverse Linux

Introduction au reverse engineering sur Linux.

https://www.youtube.com/watch?v=TUtQcezMDUU

#Reverse

2016-06-14 Instrumentation dynamique de binaires avec l'outil Frida

Conférence sur l'instrumentation dynamique de binaires avec l'outil Frida, enregistrée le 14 juin 2016.

https://www.youtube.com/watch?v=CnwhZDcubqo

#Reverse

HackadayU: Reverse Engineering with Ghidra Class 2

Cours HackadayU sur le reverse engineering avec Ghidra, classe 2.

https://www.youtube.com/watch?v=uyWVztMHWtk

#Reverse

Sytrace

GitHub repository for Sytrace, a tool for tracing system calls.

https://github.com/hexabeast/Sytrace

#Reverse

Reversing Resources

Blog on reversing techniques and resources.

https://0xinfection.github.io/reversing/

#Reverse

pe_tree

GitHub repository for pe_tree, a Python module for parsing PE files.

https://github.com/blackberry/pe_tree

#Reverse

Reversing Challenges List

GitHub repository listing reversing challenges.

https://github.com/N4NU/Reversing-Challenges-List

#Reverse

dissection

GitHub repository for dissection, tools for disassembling binaries.

https://github.com/mewmew/dissection

#Reverse

Getting hint in image import by name struct in PE file

Stack Overflow question on retrieving hints from PE file import by name struct.

https://stackoverflow.com/questions/41581363/how-we-can-get-hint-in-image-import-by-name-struct-in-pe-file

#Reverse

pics

GitHub repository for pics, various binaries and related tools.

https://github.com/corkami/pics

#Reverse

Pwn Adventure

Website for Pwn Adventure, a game for hacking challenges.

https://www.pwnadventure.com/

#Reverse

Applied Reverse Engineering Series

Series of articles on applied reverse engineering.

https://revers.engineering/applied-reverse-engineering-series/

#Reverse

Begin.re

Begin.re, a platform for reverse engineering tutorials and challenges.

https://www.begin.re/

#Reverse

Triplefault.io

Triplefault.io, blog and resources for reverse engineering.

https://www.triplefault.io/

#Reverse

Reverse Engineering

GitHub repository for various reverse engineering resources.

https://github.com/mytechnotalent/Reverse-Engineering

#Reverse

elf101.pdf

PDF file on ELF 101, introduction to ELF binaries.

https://github.com/corkami/pics/blob/master/binary/elf101/elf101.pdf

#Reverse

corkami/pics

GitHub repository for corkami pics, various binary resources.

https://github.com/corkami/pics/tree/master/binary

#Reverse

Advanced Binary Analysis

Presentation on advanced binary analysis.

https://gosecure.github.io/presentations/2020-05-15-advanced-binary-analysis/

#Reverse

Understanding ELF Binaries on Linux

Article on understanding and analyzing ELF binaries on Linux.

https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/

#Reverse

Michele Bolen

Articles by Michele Bolen on Linux ELF binaries.

https://linux-audit.com/author/mboelen/

#Reverse

Reverse Engineering

GitHub repository for reverse engineering resources.

https://github.com/wtsxDev/reverse-engineering

#Reverse

hashdb

GitHub repository for hashdb, a tool for hash database management.

https://github.com/OALabs/hashdb

#Reverse

pyinstxtractor

GitHub repository for pyinstxtractor, a tool for extracting Python executables.

https://github.com/extremecoders-re/pyinstxtractor

#Reverse

Windows Internals

Article on Windows internals focusing on PE files.

https://0xrick.github.io/win-internals/pe5/

#Reverse

Hacking Windows

GitHub repository for Hacking Windows, tools and resources.

https://github.com/mytechnotalent/Hacking-Windows

#Reverse

le_stagiaire

Notion page on le_stagiaire.

https://datamix.notion.site/le_stagiaire-2f1ae5211f004f34b4b37e8a4b8aacd6

#Reverse

Not_that_hard

Notion page on Not_that_hard.

https://datamix.notion.site/Not_that_hard-6aeba9b11fe64be98889af46bbee2e85

#Reverse

Qiling Framework

GitHub repository for Qiling Framework, an advanced emulation framework.

https://github.com/qilingframework/qiling

#Reverse

jadx

GitHub repository for jadx, a decompiler for Android APK files.

https://github.com/skylot/jadx

#Reverse

NSO Zero-Click

Google Project Zero deep dive into NSO zero-click vulnerabilities.

https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html

#Reverse

How to Write a CrackMe

Article on how to write a CrackMe for CTF competitions.

https://www.pelock.com/articles/how-to-write-a-crackme-for-a-ctf-competition

#Reverse

Nanomites on Linux

Article on Nanomites malware analysis on Linux.

https://malwareandstuff.com/nanomites-on-linux/

#Reverse

Bypassing ptrace ld preload

Article on bypassing ptrace and ld preload.

https://nuculabs.dev/2020/01/02/bypassing-ptrace-ld-preload/

#Reverse

IDA 8.0 News

IDA Pro 8.0 news and updates.

https://hex-rays.com/products/ida/news/8_0/

#Reverse

Dofus and Reverse Engineering

Article on Dofus and reverse engineering.

https://blog.jaichange.fr/dofus-et-le-reverse-engineering/

#Reverse

Moqhao Malware Analysis

Article on Moqhao malware analysis.

https://www.xanhacks.xyz/p/moqhao-malware-analysis/

#Reverse

Defeating Nanomites

Article on defeating Nanomites malware.

https://prog0.re/posts/htb/indefinite-defeating-nanomites/

#Reverse

Analyzing Golang Executables

Article on analyzing Golang executables.

https://www.pnfsoftware.com/blog/analyzing-golang-executables/

#Reverse

PE Bear

GitHub repository for PE Bear, a PE file analysis tool.

https://github.com/hasherezade/pe-bear

#Reverse

Hunting for Malicious PowerShell

Article on hunting for malicious PowerShell scripts.

https://www.splunk.com/en_us/blog/security/hunting-for-malicious-powershell-using-script-block-logging.html

#Reverse

Leddx

GitHub repository for Leddx, a tool for analyzing Linux executables.

https://github.com/Lexterl33t/Leddx

#Reverse

IDA Plugin Capa

GitHub repository for Capa, an IDA Pro plugin.

https://github.com/mandiant/capa/tree/master/capa/ida/plugin

#Reverse

hashdb IDA

GitHub repository for hashdb IDA, a hash database plugin for IDA Pro.

https://github.com/OALabs/hashdb-ida

#Reverse

Mobile Security Framework

Website for Mobile Security Framework.

https://mobsf.live/

#Reverse

Reversing Crypto Functions

Blog post on reversing AES crypto functions.

https://www.goggleheadedhacker.com/blog/post/reversing-crypto-functions-aes

#Reverse

FCSC 2022 Writeup

Writeup for FCSC 2022 challenge hyper-packer.

https://ctf.0xff.re/2022/fcsc_2022/hyper-packer

#Reverse

Dogbolt

Website for Dogbolt, a platform for hacking challenges.

https://dogbolt.org/

#Reverse

Compiler Explorer

Compiler Explorer, an interactive compiler exploration tool.

https://godbolt.org/

#Reverse

BIOS ROM Mapping

Stack Overflow question on BIOS ROM mapping.

https://stackoverflow.com/questions/7804724/how-is-the-bios-rom-mapped-into-address-space-on-pc

#Reverse

Smokeloader Malware Analysis

Article on Smokeloader malware analysis.

https://n1ght-w0lf.github.io/malware%20analysis/smokeloader/

#Reverse

Kasada JavaScript Obfuscation

Article on Kasada JavaScript VM obfuscation.

https://opcodes.fr/publications/2021-08/kasada-javascript-vm-obfuscation-reverse-part1

#Reverse

Malware Analysis Series

Article series on malware analysis.

https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/

#Reverse

GDS Decompressor

GitHub repository for GDS decompressor.

https://github.com/bruvzg/gdsdecomp

#Reverse

Bashfuscator

GitHub repository for Bashfuscator, a Bash obfuscator.

https://github.com/Bashfuscator/Bashfuscator

#Reverse

inctf Jazz Writeup

Writeup for inctf Jazz challenge.

http://aassfxxx.infos.st/write-up-inctf-jazz.html

#Reverse

Nanomites on Linux

Article on Nanomites malware analysis on Linux.

https://malwareandstuff.com/nanomites-on-linux/

#Reverse

Symbolic Execution for Nanomites

Blog post on symbolic execution for Nanomites malware.

https://doar-e.github.io/blog/2014/10/11/taiming-a-wild-nanomite-protected-mips-binary-with-symbolic-execution-no-such-crackme/

#Reverse

Debug Blocker for Linux

Article on debug blocker for Linux applications using Nanomites.

https://www.codeproject.com/Articles/621236/Nanomite-and-Debug-Blocker-for-Linux-Applications

#Reverse

Unscrambling Lua

Blog post on unscrambling Lua code.

https://vovohelo.medium.com/unscrambling-lua-7bccb3d5660

#Reverse

Defeating Code Obfuscation with Angr

Blog post on using Angr to defeat code obfuscation.

https://napongizero.github.io/blog/Defeating-Code-Obfuscation-with-Angr

#Reverse

AngryGhidra

GitHub repository for AngryGhidra, Ghidra scripts and plugins.

https://github.com/Nalen98/AngryGhidra

#Reverse

AngryIDA

GitHub repository for AngryIDA, IDA Pro scripts and plugins.

https://github.com/Brandon-Everhart/AngryIDA

#Reverse

Angr Examples

GitHub repository with Angr examples.

https://github.com/angr/angr-doc/tree/master/examples

#Reverse

Angr Basics

Blog post on Angr basics.

https://shoxxdj.fr/angr-basics/

#Reverse

luadec

GitHub repository for luadec, a Lua decompiler.

https://github.com/viruscamp/luadec

#Reverse

luadec51

GitHub repository for luadec 5.1, a Lua 5.1 decompiler.

https://github.com/sztupy/luadec51

#Reverse

Unluac

SourceForge page for Unluac, a Lua decompiler.

https://sourceforge.net/projects/unluac/files/

#Reverse

Debug ARM Binary under x86 Linux

Article on debugging ARM binaries under x86 Linux.

https://0x90909090.blogspot.com/2014/01/how-to-debug-arm-binary-under-x86-linux.html

#Reverse

Bypass Anti-debug Techniques

Article on bypassing anti-debug techniques.

https://www.orangecyberdefense.com/fr/insights/blog/reponse-a-incident/bypass-des-anti-debugs-de-neurevt

#Reverse

JEB Community Edition

Website for JEB Community Edition, an interactive disassembly tool.

https://www.pnfsoftware.com/jeb/community-edition

#Reverse

KoiVM Virtualization

GitHub repository for KoiVM, a virtualization tool for .NET.

https://github.com/Loksie/KoiVM-Virtualization

#Reverse

Venturi77 Call Hijacker

GitHub repository for Venturi77 Call Hijacker.

https://github.com/AxDSan/Venturi77CallHijacker

#Reverse

Binsec

Binsec, articles and tools for binary security.

https://binsec.github.io/

#Reverse

Reverse .NET Easily

Article on easily reversing .NET applications.

https://vozec.fr/articles/comment-reverse-du-.net-facilement/

#Reverse

ExtremeDumper

GitHub repository for ExtremeDumper, a memory dumping tool.

https://github.com/wwh1004/ExtremeDumper

#Reverse

.NET Deobfuscator

.NET Deobfuscator, open-source library for .NET deobfuscation.

https://opensourcelibs.com/lib/.net-deobfuscator

#Reverse

inctf Jazz Writeup

Writeup for inctf Jazz challenge.

http://aassfxxx.infos.st/write-up-inctf-jazz.html

#Reverse

Rustytheclown Writeup

Writeup for Rustytheclown challenge.

https://vozec.fr/writeups/rustytheclown-lehack2022/

#Reverse

SecLounge CTF 2020

Writeup for SecLounge CTF 2020 challenges.

https://cujo.com/first-seclounge-ctf-2020-re-and-misc-challenges/

#Reverse

Backdoor 2017 No Calm 350

Notes on Backdoor 2017 No Calm 350 challenge.

https://vishnudevtj.github.io/notes/backdoor-2017-no-calm-350

#Reverse

MalwareLab

Website for MalwareLab, resources for malware analysis.

https://malwarelab.eu/

#Reverse

Reversing F4B Challenge

Blog post on reversing F4B challenge.

https://blog.tetrane.com/2016/11/reversing-f4b-challenge-part1.html

#Reverse

Triton Library

Triton Library, resources for Triton binary analysis framework.

https://triton-library.github.io/

#Reverse

pydumpck

GitHub repository for pydumpck, a Python library for dumping process memory.

https://github.com/serfend/pydumpck

#Reverse

Automate Solving Anti-debug Binaries

Blog post on automating solving anti-debug binaries with Angr.

https://cothan.blog/post/automate-solving-anti-debug-binary-with-angr/

#Reverse

Angr Introduction

Blog post series on Angr introduction.

https://blog.notso.pro/2019-03-25-angr-introduction-part1/

#Reverse

FCSC 2022 Writeup

Writeup for FCSC 2022 challenge.

https://ctftime.org/writeup/17632

#Reverse

Unpacking Challenges

Blog post on unpacking challenges.

https://kernemporium.github.io/posts/unpacking/

#Reverse

Godot Unpacker

GitHub repository for Godot Unpacker, a tool for unpacking Godot Engine games.

https://github.com/tehskai/godot-unpacker

#Reverse

PinCTF

GitHub repository for PinCTF, a Capture The Flag platform.

https://github.com/ChrisTheCoolHut/PinCTF

#Reverse

arm_now

GitHub repository for arm_now, a Docker image for emulating ARM systems.

https://github.com/nongiach/arm_now

#Reverse

Ground Zero Part 1

Blog post on reversing basics, Ground Zero Part 1.

https://0xdarkvortex.dev/ground-zero-part-1-reverse-engineering-basics/

#Reverse

Angr Template

Template for Angr CTF challenges.

https://www.ctfnote.com/reverse/angr/template

#Reverse

Binary Research

Binary Research, articles and tools for binary analysis.

https://binaryresearch.github.io/

#Reverse

Unfork

GitHub repository for Unfork, a tool for analyzing GitHub forks.

https://github.com/whitequark/unfork

#Reverse

Windows PE Internals

Blog post on Windows PE internals.

https://dev.to/wireless90/exploring-the-export-table-windows-pe-internals-4l47

#Reverse

Phrack Magazine

Article on Phrack Magazine, issue 68.

http://phrack.org/issues/68/8.html

#Reverse

Flare-on 7 Break

Blog post on Flare-on 7 challenge break.

https://explained.re/posts/flare-on-7-break/

#Reverse

radare2-r2pipe

GitHub repository for radare2-r2pipe, a radare2 scripting library.

https://github.com/radareorg/radare2-r2pipe

#Reverse

DP701

GitHub repository for DP701, a tool for analyzing 701 assembly code.

https://github.com/pr701/dp701

#Reverse

Lxt33r Tweet

Tweet by Lxt33r.

https://twitter.com/lxt33r/status/1609896059677061120

#Reverse

Personal Website

Personal website of Steakenthusiast.

https://steakenthusiast.github.io/

#Reverse

Understanding GLIBC Malloc

Blog post on understanding GLIBC malloc.

https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/

#Reverse

Syscalls Used by Malloc

Blog post on syscalls used by GLIBC malloc.

https://sploitfun.wordpress.com/2015/02/11/syscalls-used-by-malloc/

#Reverse

Heap Image

Image illustrating heap internals.

https://tyeyeah.github.io/imghost/hei/heap.png

#Reverse

Symbolic Execution with Angr

Blog post on symbolic execution and Angr.

https://tyeyeah.github.io/2020/03/05/2020-03-05-Learn-Symbolic-Execution-and-angr/

#Reverse

ReBeacon Source

GitHub repository for ReBeacon Source.

https://github.com/WBGlIl/ReBeacon_Src

#Reverse

Nanomites Sample

Sample Nanomites malware from Abuse.ch.

https://bazaar.abuse.ch/sample/90ba5aebd28cb029273ecea4d256e43c38e0e8a5cc7790b4c972ac3c07d9ac5c/

#Reverse

JavaScript AST

Demonstrations of JavaScript Abstract Syntax Trees with JointJS.

http://jointjs.com/demos/javascript-ast

#Reverse

SegmentFault

Article on SegmentFault about reverse engineering.

https://segmentfault.com/a/1190000041765775/en

#Reverse

Babel Handbook

GitHub repository for the Babel Handbook in French.

https://github.com/jamiebuilds/babel-handbook/blob/master/translations/fr/README.md

#Reverse

PwnMeCTF 2022 Writeup

Writeup for PwnMeCTF 2022 challenge.

https://njord.re/blog/pwnmectf2022_wu/

#Reverse

Hunting Timer Queue Timers

Article on hunting for Timer Queue timers.

https://labs.withsecure.com/publications/hunting-for-timer-queue-timers

#Reverse

TickTock

GitHub repository for TickTock, a tool for timer-based attacks.

https://github.com/WithSecureLabs/TickTock

#Reverse

AST Explorer

Website for exploring Abstract Syntax Trees.

https://astexplorer.net/

#Reverse

Black Ops 3 Reverse Engineering

Blog post on reverse engineering integrity checks in Black Ops 3.

https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/

#Reverse

boiii

GitHub repository for boiii, a tool for analyzing Black Ops 3.

https://github.com/momo5502/boiii/

#Reverse

TokyoWesterns 2019

Blog post on TokyoWesterns 2019 challenges.

https://blog.h25.io/TokyoWesterns-2019/

#Reverse

Manticore

GitHub repository for Manticore, a symbolic execution tool.

https://github.com/trailofbits/manticore

#Reverse

Differential Fault Analysis on White Box AES

Article on differential fault analysis on white box AES implementations.

https://blog.quarkslab.com/differential-fault-analysis-on-white-box-aes-implementations.html

#Reverse

Cryptographie en Boite Blanche

Article on cryptography in white box implementations.

https://connect.ed-diamond.com/MISC/mischs-005/cryptographie-en-boite-blanche-cacher-des-cles-dans-du-logiciel

#Reverse

UnKnoWnCheaTs Game Hacking Wiki

Wiki page for UnKnoWnCheaTs Game Hacking.

https://www.unknowncheats.me/wiki/UnKnoWnCheaTs_Game_Hacking_Wiki

#Reverse

Ground Zero Part 1

Blog post on reversing basics, Ground Zero Part 1.

https://0xdarkvortex.dev/ground-zero-part-1-reverse-engineering-basics/

#Reverse

Angr Template

Template for Angr CTF challenges.

https://www.ctfnote.com/reverse/angr/template

#Reverse

Binary Research

Binary Research, articles and tools for binary analysis.

https://binaryresearch.github.io/

#Reverse

Unfork

GitHub repository for Unfork, a tool for analyzing GitHub forks.

https://github.com/whitequark/unfork

#Reverse

Windows PE Internals

Blog post on Windows PE internals.

https://dev.to/wireless90/exploring-the-export-table-windows-pe-internals-4l47

#Reverse

Phrack Magazine

Article on Phrack Magazine, issue 68.

http://phrack.org/issues/68/8.html

#Reverse

Flare-on 7 Break

Blog post on Flare-on 7 challenge break.

https://explained.re/posts/flare-on-7-break/

#Reverse

Radare2 r2pipe

GitHub repository for radare2 r2pipe

https://github.com/radareorg/radare2-r2pipe

#Reverse

DP701

GitHub repository for DP701

https://github.com/pr701/dp701

#Reverse

Tweet by Lxt33r

Tweet by Lxt33r about reverse engineering

https://twitter.com/lxt33r/status/1609896059677061120

#Reverse

Hacking Google Home

Blog post about hacking Google Home devices

https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html

#Reverse

Star 2022 Reverse Writeup

Writeup for Star 2022 reverse engineering challenge

https://github.com/0x14mth3n1ght/Writeup/tree/master/Star2022/Reverse

#Reverse

IDALibcAutoFlags

GitHub repository for IDA Pro library auto flags

https://github.com/0xMirasio/IDALibcAutoFlags

#Reverse

JavaScript Antidebugging Techniques

Blog post discussing JavaScript antidebugging techniques

https://x-c3ll.github.io/posts/javascript-antidebugging/

#Reverse

First Steps with Unicorn Engine

Introduction to Unicorn Engine

https://sudonull.com/post/7857-First-steps-with-Unicorn-Engine

#Reverse

Unicorn Engine Tutorial

Tutorial on using Unicorn Engine

https://eternal.red/2018/unicorn-engine-tutorial/

#Reverse

Introduction to Reverse Engineering (CTF Wiki)

Introduction to reverse engineering from CTF Wiki

https://ctf-wiki.mahaloz.re/reverse/introduction/

#Reverse

Decrypting BazarLoader Strings with Unicorn

Decrypting BazarLoader strings using Unicorn Engine

https://medium.com/walmartglobaltech/decrypting-bazarloader-strings-with-a-unicorn-15d2585272a9

#Reverse

Reversing U-Boot Bootloader (Part 1)

Reversing embedded device bootloader U-Boot (Part 1)

https://www.shielder.com/blog/2022/03/reversing-embedded-device-bootloader-u-boot-p.1/

#Reverse

Reversing U-Boot Bootloader (Part 2)

Reversing embedded device bootloader U-Boot (Part 2)

https://www.shielder.com/blog/2022/03/reversing-embedded-device-bootloader-u-boot-p.2/

#Reverse

Hunting Bugs in Telegram's Animated Stickers

Hunting for bugs in Telegram's animated stickers remote attack surface

https://www.shielder.com/blog/2021/02/hunting-for-bugs-in-telegrams-animated-stickers-remote-attack-surface/

#Reverse

OWASP MASTG: Reverse Engineering and Tampering

Document on reverse engineering and tampering from OWASP MASTG

https://github.com/OWASP/owasp-mastg/blob/master/Document/0x06c-Reverse-Engineering-and-Tampering.md

#Reverse

GhidrAI

GitHub repository for GhidrAI

https://github.com/20urc3/GhidrAI

#Reverse

Reverse Engineering Virtual Machine Protected Binaries

Reverse engineering virtual machine protected binaries

https://resources.infosecinstitute.com/topic/reverse-engineering-virtual-machine-protected-binaries/

#Reverse

Esdeobfuscate

GitHub repository for Esdeobfuscate

https://github.com/m1el/esdeobfuscate

#Reverse

Game Hacking PDF

Document on game hacking in PDF format

https://www.docdroid.net/rtoAc2n/game-hacking-pdf

#Reverse

Rail Tickets

Article about rail tickets

https://eta.st/2023/01/31/rail-tickets.html

#Reverse

Unity Mono Game Hacking

Article on hacking Unity Mono games

https://oniithecat.github.io/articles/unity-mono-game-hacking/

#Reverse

RISC-V Bytes with QEMU GDB

Post about RISC-V bytes with QEMU GDB

https://danielmangum.com/posts/risc-v-bytes-qemu-gdb/

#Reverse

Deadpool

GitHub repository for Deadpool

https://github.com/SideChannelMarvels/Deadpool

#Reverse

Triton Issue #1078

Issue #1078 in Triton repository

https://github.com/JonathanSalwan/Triton/issues/1078

#Reverse

Cerberus

GitHub repository for Cerberus

https://github.com/h311d1n3r/Cerberus/

#Reverse

AlphaGolang

GitHub repository for AlphaGolang

https://github.com/SentineLabs/AlphaGolang

#Reverse

Reverse Engineering Basics

GitHub repository for Reverse Engineering Basics

https://github.com/w3th4nds/Reverse_Engineering

#Reverse

Tweet by birchb0y

Tweet by birchb0y about reverse engineering

https://twitter.com/birchb0y/status/1644812374740815881?s=46

#Reverse

Awesome Malware Analysis

GitHub repository for Awesome Malware Analysis

https://github.com/rshipp/awesome-malware-analysis

#Reverse

REMNux Documentation

Documentation for REMNux

https://docs.remnux.org/

#Reverse

Miasm

GitHub repository for Miasm

https://github.com/cea-sec/miasm

#Reverse

Bulldozer Thesis

Thesis on Bulldozer

https://github.com/ceres-c/bulldozer/blob/master/thesis.pdf

#Reverse

ExpoSE

GitHub repository for ExpoSE

https://github.com/ExpoSEJS/ExpoSE

#Reverse

MIT OCW: Fundamentals of Program Analysis

Course on MIT OCW: Fundamentals of Program Analysis

https://ocw.mit.edu/courses/6-820-fundamentals-of-program-analysis-fall-2015/

#Reverse

CTFAK 2.0

GitHub repository for CTFAK 2.0

https://github.com/CTFAK/CTFAK2.0

#Reverse

Twitch Video: Reverse Engineering

Video on Twitch about reverse engineering

https://www.twitch.tv/videos/1716069219

#Reverse

FirmAE

GitHub repository for FirmAE

https://github.com/pr0v3rbs/FirmAE

#Reverse

InsomniHack 2023 - InsoBug

InsomniHack 2023 InsoBug writeup

https://itm4n.github.io/insomnihack-2023-insobug/

#Reverse

Dynamic Shellcode Analysis

Blog post on dynamic shellcode analysis

https://miasm.re/blog/2016/02/12/dynamic_shellcode_analysis.html

#Reverse

AES Finder

GitHub repository for AES Finder

https://github.com/mmozeiko/aes-finder

#Reverse

FCSC 2021 Writeup

Writeup for FCSC 2021 challenge

https://github.com/loulous24/FCSC/blob/master/FCSC2021/WU_vmv.md

#Reverse

Analyzing ELF Binaries with Malformed Headers

Analyzing ELF binaries with malformed headers - Part 3

https://binaryresearch.github.io/2020/01/15/Analyzing-ELF-Binaries-with-Malformed-Headers-Part-3-Solving-A-Corrupted-Keygenme.html

#Reverse

Radius

GitHub repository for Radius

https://github.com/aemmitt-ns/radius

#Reverse

Hola Amigo CTF Writeup

CTF writeup for Hola Amigo

https://ctf.0xff.re/2023/fcsc-2023/hola-amigo

#Reverse

Deadpool

GitHub repository for Deadpool

https://github.com/SideChannelMarvels/Deadpool

#Reverse

GDB Dashboard

GitHub repository for GDB Dashboard

https://github.com/cyrus-and/gdb-dashboard

#Reverse

UPX Recovery Tool

GitHub repository for UPX Recovery Tool

https://github.com/NozomiNetworks/upx-recovery-tool

#Reverse

Ghidra2DWARF

GitHub repository for Ghidra2DWARF

https://github.com/cesena/ghidra2dwarf

#Reverse

UXN Disassembler

GitHub repository for UXN Disassembler

https://github.com/Liorst4/uxn-disassembler

#Reverse

Win Reverse

GitHub repository for Win Reverse

https://github.com/wtsxDev/reverse-engineering

#Reverse

Starlink Hacking

Article on Starlink hacking

https://radioactive.blog/2023/06/23/starlink_hacking/

#Reverse

How to Reverse Engineer a Unity Game

Tutorial on how to reverse engineer a Unity game

https://www.kodeco.com/36285673-how-to-reverse-engineer-a-unity-game

#Reverse

Dharma

GitHub repository for Dharma

https://github.com/posidron/dharma

#Reverse

GameBanana Tutorial

Tutorial on GameBanana

https://gamebanana.com/tuts/14977

#Reverse

AssetStudio

GitHub repository for AssetStudio

https://github.com/Perfare/AssetStudio

#Reverse

Unity Game Hacking

GitHub repository for Unity Game Hacking

https://github.com/imadr/Unity-game-hacking

#Reverse

Ariadne

GitHub repository for Ariadne

https://github.com/seeinglogic/ariadne

#Reverse

Win Reverse

GitHub repository for Win Reverse

https://github.com/CZashi/win-reverse

#Reverse

UEFI Run

GitHub repository for UEFI Run

https://github.com/Richard-W/uefi-run

#Reverse

Pyrrha

GitHub repository for Pyrrha

https://github.com/quarkslab/pyrrha

#Reverse

libRetroReversing

GitHub repository for libRetroReversing

https://github.com/RetroReversing/libRetroReversing

#Reverse

Reverse Engineering Online Games

Blog post on reverse engineering online games

https://0xbaadf00dsec.blogspot.com/2016/01/reverse-engineering-online-games.html

#Reverse

Android Boot Image Editor

GitHub repository for Android Boot Image Editor

https://github.com/cfig/Android_boot_image_editor

#Reverse

Kaitai Struct

Kaitai Struct website

https://kaitai.io/

#Reverse

WrongBaud

WrongBaud blog

https://wrongbaud.github.io/

#Reverse

Konami Arcade DRM

Blog post on Konami Arcade DRM

https://mon.im/2017/12/konami-arcade-drm.html

#Reverse

Business CTF License Generator Writeups

Writeups for Business CTF License Generator

https://github.com/Lexterl33t/wu-htb-buisness-ctf-license-generator

#Reverse

JustCTF 2020 Re-Writeups

Re-Writeups for JustCTF 2020

https://blog.efiens.com/post/midas/justctf2020-re-writeups/

#Reverse

Unicorn Articles

Articles on Unicorn

https://lupyuen.github.io/articles/unicorn

#Reverse

Switch IDA Pro Loader

Tool for loading and manipulating binaries in IDA Pro for Nintendo Switch

https://github.com/pgarba/switchidaproloader

#Reverse

Reverse Engineering Toolkit

Comprehensive toolkit for various reverse engineering tasks

https://github.com/geeksniper/reverse-engineering-toolkit

#Reverse

ConfuserEx Unpacker 2

Utility to unpack and analyze software obfuscated with ConfuserEx

https://github.com/hackovh/ConfuserEx-Unpacker-2

#Reverse

DIE Engine

DIE is a cross-platform utility for exploring and analyzing executables

https://github.com/horsicq/DIE-engine

#Reverse

Shinigami

Framework and tools for automated reverse engineering tasks

https://github.com/buzzer-re/Shinigami

#Reverse

D810

Project repository for D810, focusing on embedded systems security and analysis

https://gitlab.com/eshard/d810

#Reverse

NET Reactor Slayer

Tool to reverse-engineer and defeat protections applied by NET Reactor

https://github.com/SychicBoy/NETReactorSlayer

#Reverse

Lighthouse

Lighthouse is a dynamic analysis tool for identifying vulnerabilities in software binaries

https://github.com/gaasedelen/lighthouse

#Reverse

bncov

Coverage-guided analysis tool for binaries, developed by ForAllSecure

https://github.com/ForAllSecure/bncov

#Reverse

Mega.nz - Public Folder

Publicly shared folder containing various tools and resources for reverse engineering

https://mega.nz/folder/Pe5WwRJT

#Reverse

Zero2Auto Courses

Courses and training materials on reverse engineering and exploitation techniques

https://courses.zero2auto.com/

#Reverse

Removing Control Flow Flattening with Binary Ninja

Techniques and workflows for reversing control flow flattening in binaries using Binary Ninja

https://www.lodsb.com/removing-control-flow-flattening-with-binary-ninja

#Reverse

Twitter - Mr. Phrazer

Tweet discussing latest advancements in reverse engineering

https://twitter.com/mr_phrazer/status/1686648031880630272

#Reverse

Electron Inject

Tool for injecting code into Electron applications for analysis and testing

https://github.com/tintinweb/electron-inject

#Reverse

ldr_data_table_entry32

Documentation for Windows LDR data table entry structure

https://ntdoc.m417z.com/ldr_data_table_entry32

#Reverse

Rust Reversing Helper

Collection of utilities and scripts to assist in reversing Rust binaries

https://github.com/cha5126568/rust-reversing-helper

#Reverse

LLVM Cookbook

Practical guide and recipes for using LLVM in compiler construction and analysis

https://github.com/hiro-9999/book-2/blob/master/LLVM%20Cookbook.pdf

#Reverse

llvm2c

Tool to convert LLVM IR (Intermediate Representation) to C code

https://github.com/staticafi/llvm2c

#Reverse

SEKAICTF 2023 - SFC

Write-up and resources for SEKAICTF 2023 Security CTF competition

https://fazect.github.io/sekaictf2023-sfc/

#Reverse

Goomba77

Tools and utilities for analyzing and reversing binaries

https://github.com/janisslsm/goomba77

#Reverse

MS Reverse Engineering

Insights and techniques for reverse engineering Microsoft technologies

https://www.msreverseengineering.com/

#Reverse

Cartographer

Tool for mapping and understanding binary structures and behaviors

https://github.com/nccgroup/Cartographer

#Reverse

Lockbit Ransomware Analysis

Analysis and research on the Lockbit ransomware variant

https://chuongdong.com/reverse%20engineering/2022/03/19/LockbitRansomware/

#Reverse

Obfuscation Detection

Tools and techniques for detecting and analyzing code obfuscation

https://github.com/mrphrazer/obfuscation_detection

#Reverse

Dimitri Fourny Blog

Personal blog discussing various topics including reverse engineering

https://dimitrifourny.github.io/

#Reverse

MelonLoader

Community-driven modding platform for Unity games

https://github.com/LavaGang/MelonLoader

#Reverse

Unity Explorer

Tool for exploring and understanding Unity game internals

https://github.com/sinai-dev/UnityExplorer

#Reverse

BinDiff

Tool for binary comparison and differential analysis

https://github.com/google/bindiff

#Reverse

Binary Ninja BinDiff Viewer

Viewer for BinDiff results integrated with Binary Ninja

https://github.com/PistonMiner/binaryninja-bindiff-viewer

#Reverse

Binary Auditing Solutions

Tools and methodologies for auditing and analyzing binary code

https://github.com/LordNoteworthy/binary-auditing-solutions

#Reverse

Localization with Silent SMS

Research and analysis on silent SMS localization techniques

https://mandomat.github.io/2023-09-21-localization-with-silent-SMS/

#Reverse

Binary Ninja 3.5 Expanded Universe

Updates and enhancements in Binary Ninja version 3.5

https://binary.ninja/2023/09/15/3.5-expanded-universe.html

#Reverse

Goldberg

Rust library for code generation and analysis

https://docs.rs/goldberg/latest/goldberg/

#Reverse

Obfuscating Rust Binaries using LLVM Obfuscator (Ollvm)

Techniques and tools for obfuscating Rust binaries with LLVM

https://vrls.ws/posts/2023/06/obfuscating-rust-binaries-using-llvm-obfuscator-ollvm/

#Reverse

Deep Dive into a Custom Malware Packer

In-depth analysis of a custom malware packing technique

https://vulnerablelife.wordpress.com/2017/07/02/deep-dive-into-a-custom-malware-packer/

#Reverse

WannaCry Ransomware Analysis

Analysis and insights into the WannaCry ransomware attack

https://chrollo-dll.gitbook.io/chrollo/security-blogs/malware-analysis-and-re/wannacry-ransomware

#Reverse

xAnalyzer

Tool for analyzing and understanding executable binaries

https://github.com/ThunderCls/xAnalyzer

#Reverse

Snowman

Decompiler for analyzing binary code and generating structured source code

https://github.com/x64dbg/snowman

#Reverse

Visualizing the Go GC

Insights and visualizations into the Go language Garbage Collector

https://www.aadhav.me/posts/visualizing-the-go-gc

#Reverse

Chip8dasm

Disassembler and debugger for the Chip-8 virtual machine

https://github.com/Lexterl33t/chip8dasm

#Reverse

Thalium Blog

Blog covering various topics including reverse engineering and security research

https://blog.thalium.re/

#Reverse

Ghidracraft

Extensions and plugins for enhancing Ghidra capabilities

https://github.com/StarCrossPortal/ghidracraft

#Reverse

Binary Ninja Workflows: Fixing Branch Obfuscation

Guide on fixing branch obfuscation in binaries using Binary Ninja

https://www.lodsb.com/binary-ninja-workflows-fixing-branch-obfuscation?ref=twitter-share

#Reverse

Ghidra Rickroll Plugin

Ghidra plugin for embedding Rickroll payloads

https://github.com/nneonneo/ghidra-rickroll

#Reverse

HelloSilicon

Tools and utilities for reverse engineering silicon chips

https://github.com/below/HelloSilicon

#Reverse

FairPlay Apple Obfuscation

Analysis and techniques for reversing Apple FairPlay DRM obfuscation

https://nicolo.dev/en/blog/fairplay-apple-obfuscation/

#Reverse

de4py

Tool for decompiling Python bytecode

https://github.com/Fadi002/de4py

#Reverse

SMT Solvers

Introduction and usage of SMT solvers in software reverse engineering

https://de-engineer.github.io/SMT-Solvers/

#Reverse

Malware Reverse Engineering for Beginners

Guide and resources for beginners in malware reverse engineering

https://intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/

#Reverse

HyperDbg

Next-generation debugger for analyzing and debugging binaries

https://github.com/HyperDbg/HyperDbg

#Reverse

Lockbit 3.0 Ransomware Analysis

Analysis of the latest Lockbit ransomware variant

https://www.trendmicro.com/en_us/research/22/g/lockbit-ransomware-group-augments-its-latest-variant--lockbit-3-.html

#Reverse

DebugOff

Tool to disable debugging and analysis capabilities in binaries

https://github.com/0xor0ne/debugoff

#Reverse

How to Reverse macOS Malware - Part One

Guide on reversing macOS malware with practical examples

https://www.sentinelone.com/blog/how-to-reverse-macos-malware-part-one/

#Reverse

New Fuzzer Project

New project focused on developing a fuzzer for security testing

https://h0mbre.github.io/New_Fuzzer_Project/

#Reverse

Objective-See Malware

Collection of macOS malware samples and analysis tools

https://github.com/objective-see/Malware

#Reverse

IPStorm Golang Malware Analysis

Analysis of IPStorm malware written in Golang targeting Windows

https://maldbg.com/ipstorm-golang-malware-windows

#Reverse

SysJoker Malware Analysis

Analysis of SysJoker malware in the context of Israel-Hamas cyber conflict

https://research.checkpoint.com/2023/israel-hamas-war-spotlight-shaking-the-rust-off-sysjoker/

#Reverse

idaBingGPTPlugin

Plugin for IDA Pro integrating Bing search capabilities

https://github.com/p1ay8y3ar/idaBingGPTPlugin

#Reverse

Bread

Utility for analyzing and exploring binaries

https://github.com/Theldus/bread

#Reverse

Achieving Remote Code Execution in Steam Remote Play

Technical walkthrough on achieving remote code execution via Steam Remote Play

https://blog.thalium.re/posts/achieving-remote-code-execution-in-steam-remote-play/

#Reverse

Il2CppDumper

Tool for extracting Unity Il2Cpp binaries for analysis

https://github.com/Perfare/Il2CppDumper

#Reverse

0ctf-tctf-2023 - How2Compile

Challenges and solutions from 0ctf-tctf-2023 CTF competition

https://github.com/Septyem/My-Public-CTF-Challenges/tree/master/0ctf-tctf-2023/how2compile

#Reverse

Frinet

Research and tools for analyzing and understanding firmware

https://github.com/synacktiv/frinet

#Reverse

Obfuscator Part 1

Introduction to obfuscation techniques and tools

https://blog.es3n1n.eu/posts/obfuscator-pt-1/

#Reverse

Breaking DRM in Polish Trains

Presentation on breaking DRM protection in Polish trains

https://media.ccc.de/v/37c3-12142-breaking_drm_in_polish_trains

#Reverse

JADXecute

Tool for decompiling and executing Java bytecode

https://github.com/LaurieWired/JADXecute

#Reverse

Awesome Reversing

Curated list of resources and tools for reverse engineering

https://github.com/HACKE-RC/awesome-reversing

#Reverse

Z4

Tool for analyzing and exploring compressed files

https://github.com/Tyilo/z4

#Reverse

Rust Binary Analysis Feature by Feature

In-depth analysis of Rust binaries feature by feature

https://research.checkpoint.com/2023/rust-binary-analysis-feature-by-feature/

#Reverse

DEC History Part 1

Historical overview of Digital Equipment Corporation (DEC)

https://mahaloz.re/dec-history-pt1

#Reverse

DEC History Part 2

Continuation of the historical overview of Digital Equipment Corporation (DEC)

https://mahaloz.re/dec-history-pt2

#Reverse

Comparative Analysis: Reversing Rust and C Binaries

Comparison and analysis of reversing techniques for Rust and C binaries

https://lockpin010.medium.com/comparative-analysis-reversing-rust-and-c-binaries-aa9e4b472539

#Reverse

RadDebugger

Debugger and analysis tool for RAD games

https://github.com/EpicGames/raddebugger

#Reverse

VxSig

Tool for generating and validating virus signatures

https://github.com/google/vxsig

#Reverse

Reverse Engineering a North Korean Sim City Game

Analysis and reverse engineering of a North Korean simulation game

https://digitalnk.com/blog/2019/04/21/reverse-engineering-a-north-korean-sim-city-game/

#Reverse

Porting North Korean Dictionaries with Rust

Project to port North Korean dictionaries using Rust

https://digitalnk.com/blog/2020/05/08/porting-north-korean-dictionaries-with-rust/

#Reverse

Convuster MacOS Adware in Rust

Analysis of Convuster adware targeting macOS, written in Rust

https://securelist.com/convuster-macos-adware-in-rust/101258/

#Reverse

Deobfuscate

Online tool for deobfuscating and analyzing obfuscated code

https://deobfuscate.relative.im/

#Reverse

Reverse

Unknown reverse engineering resource

https://reverse.zip/

#Reverse

InfoSec Exchange - cxiao

Post discussing various security topics on InfoSec Exchange

https://infosec.exchange/@cxiao/111812315841787228

#Reverse

InfoSec Exchange

InfoSec Exchange profile of cxiao

https://infosec.exchange/@cxiao

#Reverse

KrustyLoader Rust Malware Analysis

Analysis of KrustyLoader malware linked to Ivanti ConnectSecure compromises

https://www.synacktiv.com/publications/krustyloader-rust-malware-linked-to-ivanti-connectsecure-compromises

#Reverse

Reverse Engineering Cobalt Strike

Analysis and techniques for reverse engineering Cobalt Strike binaries

https://binary.ninja/2022/07/22/reverse-engineering-cobalt-strike.html

#Reverse

EventHelix - Rust

Insights and resources related to Rust programming language

https://www.eventhelix.com/rust/

#Reverse

PEiD - Aldeid Wiki

Information and analysis of PEiD tool for detecting packers, cryptors, and compilers

https://www.aldeid.com/wiki/PEiD

#Reverse

PaaS: How Hackers Evade Antivirus Software

Analysis of techniques used by hackers to evade antivirus software using PaaS

https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/paas-or-how-hackers-evade-antivirus-software/

#Reverse

RedLineStealer2020 Libraries

Libraries used by RedLineStealer2020 malware

https://github.com/rootpencariilmu/Redlinestealer2020/tree/main/Libraries

#Reverse

Format Args

Tutorial and techniques for handling format arguments in programming

https://blog.m-ou.se/format-args/

#Reverse

Rust Reversing: Panic Metadata

Analysis of panic metadata in Rust binaries

https://cxiao.net/posts/2023-12-08-rust-reversing-panic-metadata/

#Reverse

Binary Type Inference in Ghidra

Explanation and analysis of binary type inference techniques in Ghidra

https://blog.trailofbits.com/2024/02/07/binary-type-inference-in-ghidra/

#Reverse

Kemono.su Patreon

Patreon page for Kemono.su community

https://kemono.su/patreon/user/61490802

#Reverse

Guarded Regions in Reverse Engineering

Exploration of guarded regions in reverse engineering

https://reversing.info/posts/guardedregions/

#Reverse

Embrace the Red Blog

Blog covering various security and reverse engineering topics

https://embracethered.com/blog/

#Reverse

Learning Binary Ninja for Reverse Engineering

Guide on learning Binary Ninja for reverse engineering purposes

https://console-cowboys.blogspot.com/2024/01/learning-binary-ninja-for-reverse.html

#Reverse

The Lazy Guide to Reverse RPC

Guide on reverse RPC and its lazy implementation

https://sabotagesec.com/the-lazy-guide-to-reverse-rpc/

#Reverse

r2d2

Tool for integrating various reverse engineering tools and techniques

https://github.com/dnakov/r2d2?s=09

#Reverse

rust_type_layout_helper_bn

Helper tool for managing type layouts in Rust with Binary Ninja

https://github.com/cxiao/rust_type_layout_helper_bn

#Reverse

Whereisr0da Blog

Blog covering various aspects of reverse engineering and security

https://whereisr0da.github.io/blog/posts

#Reverse

AngryGhidra

Extensions and tools for enhancing Ghidra capabilities

https://github.com/Nalen98/AngryGhidra

#Reverse

O-MVLL

Tool for obfuscating binaries using O-MVLL technique

https://github.com/open-obfuscator/o-mvll/tree/main?tab=readme-ov-file

#Reverse

iOSRE

Resources and tools for iOS reverse engineering

https://github.com/kpwn/iOSRE/tree/master

#Reverse

iOS App Reverse Engineering Guide

Guide on reverse engineering iOS applications

https://github.com/iosre/iOSAppReverseEngineering/blob/master/iOSAppReverseEngineering.pdf

#Reverse

Anti-Debug Techniques

Analysis and techniques for evading debuggers in malware

https://anti-debug.checkpoint.com/

#Reverse

Evasion Techniques

Analysis and techniques for evading security and analysis tools

https://evasions.checkpoint.com/

#Reverse

HEVD-0

Analysis and exploitation of HEVD (HackSys Extreme Vulnerable Driver)

https://mdanilor.github.io/posts/hevd-0/

#Reverse

Secure Images

Techniques and practices for securing images in software

https://connormcgarr.github.io/secure-images/

#Reverse

TR19: I am AD FS and so can you: Attacking Active Directory Federat...

Presentation on attacking Active Directory Federation Services (AD FS)

https://www.youtube.com/watch?v=5dj4vOqqGZw

#Windows

James Forshaw - COM in Sixty Seconds! (well minutes more likely) @ ...

Exploration of COM (Component Object Model) in Windows systems

https://www.youtube.com/watch?v=dfMuzAZRGm4

#Windows

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows mac...

Discussion on LDAP and Kerberos attacks against Active Directory

https://www.youtube.com/watch?v=2Xfd962QfPs

#Windows

GopherCon 2020: Justen Walker - Safety Not Guaranteed: Calling Wind...

Presentation on calling Windows APIs and its implications

https://www.youtube.com/watch?v=EsPcKkESYPA

#Windows

Nikhil Mittal - RACE Minimal Rights and ACE for Active Directory ...

Minimal rights and ACE (Access Control Entries) in Active Directory

https://www.youtube.com/watch?v=M7Z5h6reGc4

#Windows

HEXACON2022 - Discovering a 0-Day in MS-RPC service by Ophir Harpaz...

Discovery and analysis of a zero-day vulnerability in MS-RPC service

https://www.youtube.com/watch?v=rrfI6dXMJQQ

#Windows

A Ticket Worth Waiting 65 Years For by Charlie Bromberg

Story behind a significant discovery or achievement related to Windows security

https://www.youtube.com/watch?v=UIreUeVrczM

#Windows

Import par hash, code segment & heaven's gate - Nofix

Techniques for importing and analyzing executable code segments in Windows

https://www.youtube.com/watch?v=FaqAT_57O64

#Windows

Windows Internals Process part 1 of 20 - How Deep the rabbit hole g...

Deep dive into Windows internals focusing on process management

https://www.youtube.com/watch?v=4AkzIbmI3q4

#Windows

Tracing Memory Allocations with VirtualAlloc, VirtualAllocEx and Nt...

Methods for tracing memory allocations in Windows using various APIs

https://www.youtube.com/watch?v=MPnsPlDJbhI

#Windows

Active Directory Pentesting - Red Team

Strategies and techniques for penetration testing Active Directory

https://youtube.com/playlist?list=PLziMzyAZFGMf8rGjtpV6gYbx5hozUNeSZ

#Windows

Retour d'expérience d'attaques sur Active Directory

Experience sharing and lessons learned from Active Directory attacks

https://www.youtube.com/watch?v=KRWT7Kep2lE

#Windows

2 - [English] You Do (Not) Understand Kerberos Delegation - Unconst...

Understanding Kerberos delegation in Windows environments

https://www.youtube.com/watch?v=xDFRUYv1-eU

#Windows

Six Degrees of Domain Admin... - Andy Robbins, Will Schroeder, Roha...

Exploration of escalation paths to achieve domain admin privileges

https://www.youtube.com/watch?v=lxd2rerVsLo

#Windows

NorthSec 2023 - Conference Stage 2 - Day 2

Coverage of NorthSec 2023 conference focusing on Windows security

https://www.youtube.com/live/v5Qw_MVPwF0?feature=share

#Windows

Active Directory Basics For CTF Players

Fundamental concepts of Active Directory for Capture The Flag players

https://www.youtube.com/watch?v=g_l_vKYyb5E

#Windows

TR19: BloodHound and the Adversary Resilience Methodology

Discussion on BloodHound and its use in adversary resilience strategies

https://www.youtube.com/watch?v=0r8FzbOg2YU

#Windows

POWERSHELL: Random Users & Weak Passwords (Active Directory #03)

Tutorial on PowerShell techniques related to managing users and passwords in Active Directory

https://www.youtube.com/watch?v=66ZD1J-AR2c

#Windows

Hunting for Diamond and Sapphire Forged Kerberos Tickets | Threat S...

Analysis and hunting techniques for forged Kerberos tickets in Windows environments

https://www.youtube.com/watch?v=IXtgMjJ706Y

#Windows

Du Driver Windows à l'EDR - Aurelien Chalot 🇫🇷

Exploration from Windows drivers to Endpoint Detection and Response (EDR)

https://www.youtube.com/watch?v=yacpjV6kWpM

#Windows

06 - BruCON 0x0E - 0wn-premises: Bypassing Microsoft Defender for I...

Methods for bypassing Microsoft Defender in on-premises environments

https://www.youtube.com/watch?v=bzLvOu1awKM

#Windows

2 Network Enumeration - NMAP

Tutorial on network enumeration using NMAP in Windows environments

https://www.youtube.com/watch?v=0o-3wcU3FNc

#Windows

BHIS | Coercions and Relays – The First Cred is the Deepest with Ga...

Discussion on credential coercion and relay attacks in Windows networks

https://www.youtube.com/watch?v=b0lLxLJKaRs

#Windows

How to Join a Linux Machine to Active Directory (Ubuntu 20.04)

Guide on joining Linux machines to Active Directory using Ubuntu 20.04

https://www.youtube.com/watch?v=3TPgxpjgYsU

#Windows

Malware Development: System Calls

Exploration of system calls related to malware development on Windows

https://www.youtube.com/watch?v=-M2_mZg_2Ew

#Windows

1 - [English] You Do (Not) Understand Kerberos Delegation - Introdu...

Introduction to understanding Kerberos delegation in Windows environments

https://www.youtube.com/watch?v=p9QFdITuvgU

#Windows

[TECH] Le point sur PETITPOTAM

Technical overview of PETITPOTAM vulnerability in Windows environments

https://www.youtube.com/watch?v=tgHBm83COZ4

#Windows

Monitorez votre domaine Active Directory avec LDAPmonitor ! (FR)

Tutorial in French on monitoring Active Directory with LDAPmonitor

https://www.youtube.com/watch?v=JnxiB68aLqs

#Windows

How to set up PowerShell prompt with Oh My Posh on Windows 11

Guide on setting up PowerShell prompt with Oh My Posh on Windows 11

https://www.youtube.com/watch?v=5-aK2_WwrmM

#Windows

Exploiting MSDT 0-Day CVE-2022-30190

Exploitation techniques for MSDT (Microsoft Support Diagnostic Tool) 0-day vulnerability

https://www.youtube.com/watch?v=dGCOhORNKRk

#Windows

Delegating Kerberos To Bypass Kerberos Delegation Limitation by Cha...

Techniques for bypassing Kerberos delegation limitations in Windows

https://www.youtube.com/watch?v=byykEId3FUs

#Windows

Le HACK 2019 - Sysmon Internals - Stefan Le Berre

Deep dive into Sysmon (System Monitor) internals in Windows environments

https://www.youtube.com/watch?v=x8ru9HQNeVg

#Windows

Joining an ACTIVE DIRECTORY Domain (AD #01)

Guide on joining an Active Directory domain

https://www.youtube.com/watch?v=19pNfFnBfI8

#Windows

[Hors Série] Cracking dans le Cloud avec Microsoft Azure et Hashcat

Special episode on cracking in Microsoft Azure cloud with Hashcat

https://www.youtube.com/watch?v=rXcgNrZ29Dc

#Windows

Manually Parse Bloodhound Data with JQ to Create Lists of Potential...

Tutorial on parsing BloodHound data manually using JQ

https://www.youtube.com/watch?v=o3W4H0UfDmQ

#Windows

ACTIVE DIRECTORY #00 Creating our Server + Workstation Virtual Envi...

Setting up server and workstation virtual environments for Active Directory

https://www.youtube.com/watch?v=pKtDQtsubio

#Windows

Dancing with COM - Deep dive into understanding Component Object Model

Deep dive into understanding Component Object Model (COM) in Windows

https://www.youtube.com/watch?v=8tjrFm2K30Q&start=131

#Windows

Cours - Les bases de l'Active Directory

Course covering the basics of Active Directory

https://youtube.com/playlist?list=PLSuzYIVSEUT4VSB0m0NdiML2V0PDWQyAN

#Windows

Windows Internals Crash Course

Crash course on Windows internals

https://www.youtube.com/watch?v=I_nJltUokE0

#Windows

Powershell For Pentesters

Playlist covering PowerShell techniques for penetration testers

https://youtube.com/playlist?list=PLziMzyAZFGMeDcGdkEDPfD1mgZ8HVJMJ0

#Windows

VbScrub

YouTube channel of VbScrub

https://www.youtube.com/@vbscrub1282

#Windows

DEF CON 31 - Staying Undetected Using the Windows Container Isolati...

Strategies for staying undetected using Windows container isolation

https://www.youtube.com/watch?v=Cm-zFx6hwzk

#Windows

Breaking Bitlocker - Bypassing the Windows Disk Encryption

Techniques for bypassing BitLocker encryption on Windows

https://www.youtube.com/watch?v=wTl4vEednkQ

#Windows

So I became a Domain Controller

Story or tutorial on becoming a Domain Controller

https://www.youtube.com/watch?v=EcLSz2x4Q4c

#Windows

Searching for RPC Functions to Coerce Authentications in Microsoft ...

Techniques for searching RPC functions to coerce authentications in Windows

https://www.youtube.com/watch?v=JWI_khgpyYM

#Windows

Here Be Dragons The Unexplored Land of Active Directory ACLs [Corre...

Exploration of unexplored aspects of Active Directory ACLs

https://www.youtube.com/watch?v=z8thoG7gPd0

#Windows

ATTL4S

YouTube channel of ATTL4S

https://youtube.com/c/ATTL4S

#Windows

DEF CON 25 - Lee Holmes - Get $pwnd - Attacking Battle Hardened Win...

Presentation on attacking battle-hardened Windows systems

https://www.youtube.com/watch?v=6vOiHKDRhbM

#Windows

[🔴 Webinaire] - Cobalt Strike : Découverte, Simulation, Détection e...

Webinar on discovering, simulating, and detecting Cobalt Strike attacks

https://www.youtube.com/watch?v=AhKtJWcsc94

#Windows

TROOPERS22: Eight ways to compromise AD FS certificates

Discussion on compromising AD FS (Active Directory Federation Services) certificates

https://www.youtube.com/watch?v=MpCbICF76qQ

#Windows

Introducing ROADtools - Azure AD exploration for Red Teams and Blue...

Introduction to ROADtools for exploring Azure Active Directory in Red Team engagements

https://www.youtube.com/watch?v=o5QDt30Pw_o

#Windows

Conda

YouTube channel of Conda

https://youtube.com/c/c0nd4

#Windows

Windows Local Privilege Escalation

Playlist covering Windows local privilege escalation techniques

https://www.youtube.com/playlist?list=PLjG9EfEtwbvIrGFTx4XctK8IxkUJkAEqP

#Windows

TikiLateral

Exploration of TikiLateral techniques in Windows environments

https://www.youtube.com/watch?v=iR-eoN0qr1k

#Windows

The Backup Operators Guide To The Galaxy

Guide on using Backup Operators in Windows environments

https://www.youtube.com/watch?v=YaDBUfCQXW4

#Windows

How to Setup a Virtual Windows Active Directory Domain

Guide on setting up a virtual Windows Active Directory domain

https://www.youtube.com/watch?v=Bm3mihQNGI4

#Windows

OnlyMalware - Getting Started with Windows Malware Development - by...

Getting started with Windows malware development

https://www.youtube.com/watch?v=L9SI-PZ8-j8

#Windows

Black Hat USA Arsenal 2023: Abusing Microsoft SQL Server with SQLRecon

Abusing Microsoft SQL Server using SQLRecon tool

https://www.youtube.com/watch?v=LsYSePobFWA

#Windows

🇫🇷 DÉLÉGUER KERBEROS POUR CONTOURNER DES LIMITATIONS DE LA DÉLÉ...

Techniques pour contourner les limitations de la délégation Kerberos dans les environnements Windows

https://www.youtube.com/watch?v=7_iv_eaAFyQ

#Windows

PowerShell for Pentesters

Playlist covering PowerShell techniques for penetration testers

https://www.youtube.com/playlist?list=PLJQHPJLj_SQatUsJy3O4k-VQlllquDmDr

#Windows

Kerberos Authentication Explained | A deep dive

Deep dive into Kerberos authentication in Windows environments

https://www.youtube.com/watch?v=5N242XcKAsM

#Windows

HACKER UN ORDINATEUR ÉQUIPÉ D'UN ANTIVIRUS

Techniques pour hacker un ordinateur équipé d'un antivirus

https://www.youtube.com/watch?v=mug800lunGg&start=301

#Windows

Attacking And Defending Active Directory

Strategies and techniques for attacking and defending Active Directory

https://youtube.com/playlist?list=PLziMzyAZFGMdVFAyW3MVTO0P9jMmVQkTB

#Windows

Malware Development in C | Executing Shellcode using WinAPI

Malware development techniques in C for executing shellcode using WinAPI

https://www.youtube.com/watch?v=6g8w1MSz9xA

#Windows

[FR] Sthack 24 - SCCM : Some Credentials Could be Mine ! - @blwasp_

SCCM (System Center Configuration Manager) and credential exploitation

https://www.youtube.com/watch?v=ibFQgsAMjwI

#Windows

The Hacker Recipes

Recipes and techniques for cybersecurity professionals

https://www.thehacker.recipes/

#Windows

Hackndo Beta

Beta platform for cybersecurity resources and techniques

https://beta.hackndo.com/

#Windows

Active Directory Methodology - HackTricks

Methodology and techniques for Active Directory exploitation

https://book.hacktricks.xyz/windows/active-directory-methodology

#Windows

Active Directory Attack - PayloadsAllTheThings

Methods and resources for Active Directory attacks

https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md

#Windows

Active Directory Exploitation Cheat Sheet - S1ckB0y1337

Cheat sheet for Active Directory exploitation techniques

https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet

#Windows

Red Teaming Toolkit - Infosecn1nja

Toolkit for red teaming operations

https://github.com/infosecn1nja/Red-Teaming-Toolkit

#Windows

iRed Team

Techniques and tools for red teaming operations

https://ired.team/

#Windows

Active Directory Methodology - HackTricks

Methodology and techniques for Active Directory exploitation

https://book.hacktricks.xyz/windows/active-directory-methodology

#Windows

Attacking Active Directory - Zer1t0

Techniques and strategies for attacking Active Directory

https://zer1t0.gitlab.io/posts/attacking_ad/

#Windows

PingCastle

Tools and resources for Active Directory security assessment

https://www.pingcastle.com/

#Windows

S4U2Pwnage by HarmJ0y

Exploration and techniques related to S4U2Pwnage

https://www.harmj0y.net/blog/activedirectory/s4u2pwnage/

#Windows

Wagging the Dog - Shenanigans Labs

Techniques for manipulating Active Directory operations

https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html

#Windows

Writing Windows Shellcode - Idafchev

Guide on writing Windows shellcode

https://idafchev.github.io/exploit/2017/09/26/writing_windows_shellcode.html

#Windows

Azure AD Introduction for Red Teamers - Synacktiv

Introduction to Azure AD for Red Team operations

https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html

#Windows

iRed Team

Techniques and tools for red teaming operations

https://ired.team/

#Windows

Wald0

Technical articles and resources

https://wald0.com/

#Windows

Fox-IT Blog

Articles on cybersecurity and Active Directory

https://blog.fox-it.com/

#Windows

Windows Notes and Cheatsheet - m0chan

Notes and cheatsheet for Windows security

https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html

#Windows

Zerologon Vulnerability in Active Directory - Silicon.fr

Analysis of the Zerologon vulnerability in Active Directory

https://www.silicon.fr/zerologon-faille-critique-active-directory-346780.html

#Windows

Certify Tool - GhostPack

Tool for managing Windows certificates

https://github.com/GhostPack/Certify

#Windows

Shadow Credentials - SpecterOps

Abusing key trust account mapping for takeover

https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab

#Windows

Active Directory Cheatsheet - Tiyeuse

Cheat sheet for Active Directory exploitation

https://github.com/tiyeuse/Active-Directory-Cheatsheet/

#Windows

Active Directory Exploitation Cheat Sheet - Fuzz-Security

Cheat sheet for Active Directory exploitation techniques

https://github.com/fuzz-security/Active-Directory-Exploitation-Cheat-Sheet

#Windows

How to Exploit Active Directory ACL Attack Paths - Praetorian

Exploration of ACL attack paths in Active Directory

https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks/

#Windows

Top 16 Active Directory Vulnerabilities - Infosec Matter

Overview of top vulnerabilities in Active Directory

https://www.infosecmatter.com/top-16-active-directory-vulnerabilities/

#Windows

Penetration Testing Active Directory Part II - Hausec

Techniques and strategies for penetration testing Active Directory

https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/

#Windows

A Guide to Attacking Domain Trusts - HarmJ0y

Guide on attacking domain trusts in Active Directory environments

http://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/

#Windows

Exploitation of DACL in Active Directory - The Red Windows

Exploitation techniques for DACL in Active Directory

http://theredwindows.net/index.php/2021/02/12/exploitation-dacl-en-active-directory/

#Windows

Krbrelayx - Dirk-jan

Toolkit for abusing unconstrained delegation in Active Directory

https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/

#Windows

Practical Guide to NTLM Relaying in 2017 - byt3bl33d3r

Guide to NTLM relaying techniques in Windows environments

https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html

#Windows

Attacking Active Directory Permissions with BloodHound - StealthBits

Techniques for attacking AD permissions using BloodHound

https://stealthbits.com/blog/attacking-active-directory-permissions-with-bloodhound/

#Windows

Active Directory Basics - Ruuand

Basic understanding and techniques for Active Directory

https://ruuand.github.io/Active_Directory/

#Windows

Digging into MS14-068 Exploitation - F-Secure Labs

Analysis and defense against MS14-068 exploitation

https://labs.f-secure.com/archive/digging-into-ms14-068-exploitation-and-defence/

#Windows

Twitter Post by Podalirius

Tweet discussing cybersecurity topics

https://twitter.com/podalirius_/status/1449735314013052931

#Windows

Evading EDR with ScareCrow - AdamsVoboda

Techniques for evading Endpoint Detection and Response with ScareCrow

https://adamsvoboda.net/evading-edr-with-scarecrow/

#Windows

In-Memory Shellcode Decoding to Evade AVs - Shells.systems

Techniques for decoding in-memory shellcode to evade Antivirus

https://shells.systems/in-memory-shellcode-decoding-to-evade-avs/

#Windows

Defeating Bitdefender Total Security - Shells.systems

Using Windows API unhooking for process injection against Bitdefender

https://shells.systems/defeat-bitdefender-total-security-using-windows-api-unhooking-to-perform-process-injection/

#Windows

PE Parsing and Defeating Hooking - Solomon Sklash

Techniques for parsing PE files and defeating hooking mechanisms

https://www.solomonsklash.io/pe-parsing-defeating-hooking.html

#Windows

MimiDrv In-Depth - SpecterOps

Analysis and usage of MimiDrv for privilege escalation

https://posts.specterops.io/mimidrv-in-depth-4d273d19e148

#Windows

Herpaderping - jxy-s

Understanding and usage of Herpaderping technique

https://jxy-s.github.io/herpaderping/

#Windows

Sharpening Cobalt Strike - Cube0x0

Tips and tricks for using Cobalt Strike effectively

https://github.com/cube0x0/SharpeningCobaltStrike

#Windows

Using Kerberos for Authentication Relay - Google Project Zero

Techniques for Kerberos authentication relay

http://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html

#Windows

Azure Red Team - Rootsecdev

Red teaming operations in Azure environments

https://github.com/rootsecdev/Azure-Red-Team

#Windows

Post-Exploitation Techniques - inf0sec.fr

Techniques for post-exploitation in Windows environments

https://inf0sec.fr/article-18.php

#Windows

Process Hollowing - Wiki-tech.io

Understanding and techniques for process hollowing

https://wiki-tech.io/S%C3%A9curit%C3%A9/Pentest/Process-Hollowing

#Windows

Defeating RunAsPPL with Vulnerable Drivers - Gorkem Karadeniz

Using vulnerable drivers to read LSASS with Mimikatz

https://gorkemkaradeniz.medium.com/defeating-runasppl-utilizing-vulnerable-drivers-to-read-lsass-with-mimikatz-28f4b50b1de5

#Windows

LSASS RunAsPPL - itm4n

Techniques for exploiting LSASS with RunAsPPL

https://itm4n.github.io/lsass-runasppl/

#Windows

Cobalt Arsenal - mgeeky

Collection of tools and techniques for Cobalt Strike

https://github.com/mgeeky/cobalt-arsenal

#Windows

HTB Hades - snovvcrash.rocks

Walkthrough and techniques for HTB Hades machine

https://snovvcrash.rocks/2020/12/28/htb-hades.html

#Windows

PowerSharpPack - S3cur3Th1sSh1t

Collection of PowerShell scripts for offensive security

https://github.com/S3cur3Th1sSh1t/PowerSharpPack

#Windows

Delegation in Windows Systems - Cheatsheet.haax.fr

Understanding and techniques for delegation in Windows systems

https://cheatsheet.haax.fr/windows-systems/privilege-escalation/delegations/

#Windows

SharpAllTheThings - N7WEra

Comprehensive guide to offensive security with SharpAllTheThings

https://github.com/N7WEra/SharpAllTheThings/blob/master/README.md

#Windows

NTLM Relaying via Cobalt Strike - Rasta Mouse

Techniques for NTLM relaying via Cobalt Strike

https://rastamouse.me/ntlm-relaying-via-cobalt-strike/

#Windows

SpecterOps Blog

Articles on cybersecurity and offensive security

https://posts.specterops.io/

#Windows

SharpCollection - Flangvik

Collection of offensive security tools in C#

https://github.com/Flangvik/SharpCollection

#Windows

Twitter Post by mpgn_x64

Tweet discussing cybersecurity topics

https://twitter.com/mpgn_x64/status/1453018750253424643

#Windows

HarmJ0y Blog

Articles on cybersecurity and red teaming

http://www.harmj0y.net/blog/blog/

#Windows

Post-Exploitation File Transfers on Windows - isroot.nl

Manual techniques for post-exploitation file transfers on Windows

https://isroot.nl/2018/07/09/post-exploitation-file-transfers-on-windows-the-manual-way/

#Windows

Abusing Exchange for Domain Admin - Dirk-jan

Exploiting Exchange for achieving domain admin privileges

https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/

#Windows

Escalating Privileges with ACLs in Active Directory - Fox-IT

Privilege escalation techniques using ACLs in Active Directory

https://blog.fox-it.com/2018/04/26/escalating-privileges-with-acls-in-active-directory/

#Windows

Active Directory Enumeration using RPCClient - Hacking Articles

Techniques for Active Directory enumeration using RPCClient

https://www.hackingarticles.in/active-directory-enumeration-rpcclient/

#Windows

Lateral Movement MegaPrimer - Riccardo Ancarani

Comprehensive guide to lateral movement techniques

https://riccardoancarani.github.io/2019-10-04-lateral-movement-megaprimer/

#Windows

LDeep - Franc Pentest

Tool for discovering hidden paths in web applications

https://github.com/franc-pentest/ldeep

#Windows

HackMag - AD Forest

Overview of Active Directory forest security

https://web.archive.org/web/20210123100256/https://hackmag.com/security/ad-forest/

#Windows

C2 Techniques - 0xRick

Overview of Command and Control techniques

https://0xrick.github.io/misc/c2/

#Windows

The Kerberos Key List Attack - SecureAuth

Understanding the Kerberos key list attack

https://www.secureauth.com/blog/the-kerberos-key-list-attack-the-return-of-the-read-only-domain-controllers/

#Windows

OutlookDecrypt - Errno.fr

Tool for decrypting Outlook encrypted messages

https://www.errno.fr/OutlookDecrypt/OutlookDecrypt

#Windows

InstallerFileTakeOver - klinix5

Techniques for taking over installer files

https://github.com/klinix5/InstallerFileTakeOver

#Windows

Bypassing Antivirus with Direct System Calls - PwnedCoffee

Techniques for bypassing Antivirus using direct system calls

https://pwnedcoffee.com/blog/red-team-tactics/bypassing-antivirus-using-direct-system-calls/

#Windows

Internal Hacking - Contre mesures en environnement Windows

Countermeasures for internal hacking in Windows environments

https://download1583.mediafire.com/lt52e50w0bpg/vwtgg2og61xqdsr/Internal+Hacking+-+Contre+mesures+en+environnement+windows.pdf

#Windows

UnderTheWire - WiredPulse

Challenges and tutorials for Windows PowerShell scripting

https://underthewire.tech/

#Windows

MoveKit - 0xthirteen

Toolkit for migrating data and settings between machines

https://github.com/0xthirteen/MoveKit

#Windows

Invoke-noPac - RicardoJBA

PowerShell script to bypass Proxy Auto-Configuration (PAC)

https://github.com/ricardojba/Invoke-noPac

#Windows

Cobalt Strike User Guide - HelpSystems

Official user guide for Cobalt Strike

https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/welcome_main.htm

#Windows

Cobalt Strike Community Kit - Cobalt-Strike

Community-driven toolkit for Cobalt Strike users

https://cobalt-strike.github.io/community_kit/

#Windows

Active Directory Certificate Services - HideAndSec

Cheatsheet for Active Directory Certificate Services

https://hideandsec.sh/books/cheatsheets-82c/page/active-directory-certificate-services

#Windows

GOAD - Orange Cyberdefense

Automated detection and response for threat hunting

https://github.com/Orange-Cyberdefense/GOAD

#Windows

Windows Privilege Escalation - TarlogicSecurity

Guide to Windows privilege escalation techniques

https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a

#Windows

Cerbero - Zer1t0

Tool for auditing and security assessment in Active Directory

https://github.com/Zer1t0/cerbero

#Windows

SePriv - Zer1t0

Tool for auditing and security assessment in Active Directory

https://github.com/Zer1t0/sepriv

#Windows

Bypassing Credential Guard - Team Hydra

Techniques for bypassing Credential Guard in Windows

https://teamhydra.blog/2020/08/25/bypassing-credential-guard/

#Windows

Bypassing LSA Protection - RedCursor

Techniques for bypassing LSA Protection without Mimikatz on Windows 10

https://redcursor.com.au/bypassing-lsa-protection-aka-protected-process-light-without-mimikatz-on-windows-10/

#Windows

Remote NTLM Relaying through Meterpreter - DiabloHorn

Techniques for remote NTLM relaying using Meterpreter

https://diablohorn.com/2018/08/25/remote-ntlm-relaying-through-meterpreter-on-windows-port-445/

#Windows

Remote NTLM Relaying - SpookySec

Techniques for remote NTLM relaying in Windows environments

https://blog.spookysec.net/remote-ntlm-relaying/

#Windows

Potatoes Windows PrivEsc

Privilege escalation techniques for Windows systems using Potatoes method

https://jlajara.gitlab.io/others/2020/11/22/Potatoes_Windows_Privesc.html

#Windows

bloodyAD

Repository for bloodyAD toolset

https://github.com/CravateRouge/bloodyAD

#Windows

Tenor Video

Video on Tenor platform

https://media.tenor.co/videos/68ae089b05b0bf14224a9a11ca41bf05/mp4

#Windows

AD-control-paths

Tool for controlling Active Directory paths by ANSSI

https://github.com/ANSSI-FR/AD-control-paths

#Windows

Active Directory Penetration Testing

Cheatsheet for Active Directory penetration testing

https://www.hackingdream.net/2021/04/active-directory-penetration-testing-cheatsheet.html

#Windows

IPv6 Attacks - Basic Attack

Basic attack vectors for IPv6 in Active Directory environments

https://xedex.gitbook.io/internalpentest/internal-pentest/active-directory/initial-attack-vectors/ipv6-attacks/basic-attack

#Windows

Windows File Transfer Cheatsheet

Cheatsheet for transferring files in Windows environments

https://infinitelogins.com/2020/09/04/windows-file-transfer-cheatsheet/

#Windows

Domain Privilege Escalation

Notes on domain privilege escalation techniques

https://notes.offsec-journey.com/active-directory/domain-privilege-escalation

#Windows

Exploiting MFA Inconsistencies on Microsoft Services

Exploitation techniques for Multi-Factor Authentication inconsistencies on Microsoft services

https://www.blackhillsinfosec.com/exploiting-mfa-inconsistencies-on-microsoft-services/

#Windows

Red Team Infrastructure

Documentation on Red Team Infrastructure

https://github.com/psychsecurity/Red-Team-Infrastructure/blob/master/README.md

#Windows

Attacking Domain Controllers

Techniques for attacking domain controllers

https://medium.com/@hyphens443/attacking-domain-controllers-a45b9cb9651c

#Windows

Active Directory Pentesting Lab Setup

Guide for setting up a lab environment for Active Directory penetration testing

https://www.hackingarticles.in/active-directory-pentesting-lab-setup/

#Windows

AD Pentest Lab Setup

Steps to set up an Active Directory penetration testing lab

https://www.hebunilhanli.com/wonderland/ad-pentest/ad-pentest-lab-setup/

#Windows

ADSecurity Article

Article on Active Directory security

https://adsecurity.org/?p=2653

#Windows

Building and Attacking an AD Lab with PowerShell

Guide on building and attacking an Active Directory lab using PowerShell

https://1337red.wordpress.com/building-and-attacking-an-active-directory-lab-with-powershell/

#Windows

Active Directory Kill Chain Attack and Defense

Active Directory kill chain attack and defense strategies

https://0x1.gitlab.io/pentesting/Active-Directory-Kill-Chain-Attack-and-Defense/

#Windows

Building an Active Directory Lab

Guide on building an Active Directory lab environment

https://robertscocca.medium.com/building-an-active-directory-lab-82170dd73fb4

#Windows

Building a Basic Active Directory Lab

Guide on building a basic Active Directory lab

https://macrosec.tech/index.php/2021/07/19/building-a-basic-active-directory-lab/

#Windows

Active Directory Pentesting Mind Map

Mind map for Active Directory penetration testing

https://www.linkedin.com/posts/ethical-hackers-academy_active-directory-pentesting-mind-map-activity-6888507705984724992-d05a

#Windows

Certified Pre-Owned

Article on certified pre-owned security assessments

https://posts.specterops.io/certified-pre-owned-d95910965cd2

#Windows

Protocoles NBT-NS LLMNR et Exploitation des Failles

Protocols NBT-NS LLMNR and Exploitation of Vulnerabilities

http://remivernier.com/index.php/2018/08/26/protocoles-nbt-ns-llmnr-et-exploitation-des-failles/

#Windows

Cobalt-Strike CheatSheet

Cheat sheet for Cobalt-Strike operations

https://github.com/S1ckB0y1337/Cobalt-Strike-CheatSheet

#Windows

Active Directory Cheat Sheet

Cheat sheet for Active Directory operations

https://github.com/RistBS/Active-directory-Cheat-sheet

#Windows

Article 16

Article on security and penetration testing

https://inf0sec.fr/article-16.php

#Windows

OffensivePythonPipeline

Binaries for Offensive Python Pipeline

https://github.com/Qazeer/OffensivePythonPipeline/tree/main/binaries

#Windows

How to Detect and Compromise Azure

Detecting and compromising Azure environments

https://www.inversecos.com/2022/01/how-to-detect-and-compromise-azure.html

#Windows

Useful LDAP Queries for Windows Active Directory Pentesting

Useful LDAP queries for Windows Active Directory penetration testing

https://podalirius.net/en/articles/useful-ldap-queries-for-windows-active-directory-pentesting/

#Windows

Beacon

Cheat sheet for Beacon tool

https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993

#Windows

Master of Puppets Part II

Tampering with EDR techniques

https://www.infosec.tirol/master-of-puppets-part-ii-how-to-tamper-the-edr/

#Windows

Azure Red Team

Red teaming exercises in Azure environments

https://github.com/rootsecdev/Azure-Red-Team

#Windows

AzureRT

Azure Red Team toolkit

https://github.com/mgeeky/AzureRT

#Windows

EDRs

Endpoint Detection and Response systems

https://github.com/Mr-Un1k0d3r/EDRs

#Windows

Windows Server AD and O365 Advanced Pentest

Advanced pentesting of Windows Server AD and Office 365 environments

https://www.linkedin.com/posts/joas-antonio-dos-santos_windows-server-ad-and-o365-advanced-pentestpdf-activity-6893640499841114112-ChFm

#Windows

Hooking Heaven's Gate

Techniques for hooking Heaven's Gate

https://medium.com/@fsx30/hooking-heavens-gate-a-wow64-hooking-technique-5235e1aeed73

#Windows

The 0x33 Segment Selector Heaven's Gate

Analysis of the 0x33 segment selector Heaven's Gate

https://www.malwaretech.com/2014/02/the-0x33-segment-selector-heavens-gate.html

#Windows

Heaven's Gate - La Porte du Ciel

Heaven's Gate exploitation techniques

https://9b113d1a.blogspot.com/2017/06/heavens-gate-la-porte-du-ciel-ou-des.html?m=1

#Windows

Twitter Video

Video from Twitter platform

https://twitter.com/podalirius_/status/1490734021332160525

#Windows

Process Injection

Code injection and process injection techniques

https://www.ired.team/offensive-security/code-injection-process-injection

#Windows

Bloodhound Quickwin

Quick wins using Bloodhound

https://github.com/kaluche/bloodhound-quickwin

#Windows

KrbRelay

Kerberos relay toolkit

https://github.com/cube0x0/KrbRelay

#Windows

Direct Syscalls - Hells & Halos

Direct syscalls using SysWhispers2

https://alice.climent-pommeret.red/posts/direct-syscalls-hells-halos-syswhispers2/

#Windows

EDRSandblast

EDR evasion using Sandblast

https://github.com/wavestone-cdt/EDRSandblast

#Windows

Twitter Video

Video from Twitter platform

https://twitter.com/podalirius_/status/1495805393607483400

#Windows

WinPwn

Windows exploitation toolkit

https://github.com/S3cur3Th1sSh1t/WinPwn

#Windows

Vergilius Project

Vergilius project documentation

https://www.vergiliusproject.com/

#Windows

Function Stomping

Function stomping techniques

https://github.com/Idov31/FunctionStomping

#Windows

Removing Kernel Callbacks Using Signed Drivers

Techniques for removing kernel callbacks using signed drivers

https://br-sn.github.io/Removing-Kernel-Callbacks-Using-Signed-Drivers/

#Windows

Turn Off Windows Defender Using Group Policy

Disabling Windows Defender using Group Policy

https://www.prajwaldesai.com/turn-off-windows-defender-using-group-policy/

#Windows

PowerUpSQL

Tool for SQL server privilege escalation

https://github.com/NetSPI/PowerUpSQL/

#Windows

Extracting Windows Credentials Using Native Tools

Techniques for extracting Windows credentials using native tools

https://www.bordergate.co.uk/extracting-windows-credentials-using-native-tools/

#Windows

DonPAPI

DonPAPI toolkit

https://github.com/login-securite/DonPAPI

#Windows

BetterSafetyKatz

Improved SafetyKatz toolkit

https://github.com/Flangvik/BetterSafetyKatz

#Windows

Article 15

Article on security and penetration testing

https://inf0sec.fr/article-15.php

#Windows

AMSI Bypass PowerShell

Bypassing AMSI using PowerShell

https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell

#Windows

In the Potato Family, I Want Them All

Exploiting Windows using Potato techniques

https://hideandsec.sh/books/windows-sNL/page/in-the-potato-family-i-want-them-all

#Windows

Chaining Multiple Techniques for Domain Takeover

Chaining multiple techniques for domain takeover using RBCD

https://orangecyberdefense.com/global/blog/sensepost/chaining-multiple-techniques-and-tools-for-domain-takeover-using-rbcd/

#Windows

Exploit PH - Active Directory

Exploit PH article on Active Directory

https://exploit.ph/category/active-directory.html

#Windows

Powermad

Powermad toolset

https://github.com/Kevin-Robertson/Powermad

#Windows

RBCD Attack

Remote Browser Code Execution Attack

https://github.com/tothi/rbcd-attack

#Windows

Martine à la recherche de la DLL Hijacking perdue

Techniques for DLL hijacking

https://sh0ckfr.com/pages/martine-a-la-recherche-de-la-dll-hijacking-perdue/

#Windows

Domain Trust Explorer

Tool for exploring domain trust relationships

https://github.com/sixdub/DomainTrustExplorer

#Windows

Divide and Conquer

Strategies for divide and conquer in security

https://polarized-macaw-687.notion.site/Divide-and-Conquer-e4d13cb9a2f6485a89003e6a627f9b26

#Windows

Empire

Empire post-exploitation framework

https://github.com/BC-SECURITY/Empire

#Windows

Unknown Link

Unknown link with unspecified content

https://t.co/SxtUGvmrmQ

#Windows

Sysmon Simulator

Simulator for Sysmon configurations

https://github.com/ScarredMonk/SysmonSimulator

#Windows

NTLM Theft

NTLM credential theft techniques

https://github.com/Greenwolf/ntlm_theft

#Windows

Windows Persistence Techniques

Windows persistence techniques

https://research.splunk.com/stories/windows_persistence_techniques/

#Windows

Windows Exploitation Resources

Resources for Windows exploitation

https://github.com/FULLSHADE/WindowsExploitationResources

#Windows

Leveraging Microsoft Teams for Covering Cobalt Strike Traffic

Techniques for using Microsoft Teams for covering Cobalt Strike traffic

https://www.blackarrow.net/leveraging-microsoft-teams-to-persist-and-cover-up-cobalt-strike-traffic/

#Windows

Kerberos Attacks

Kerberos attack techniques

https://pentestbook.six2dez.com/post-exploitation/windows/ad/kerberos-attacks

#Windows

Certipy

Certipy toolkit

https://github.com/ly4k/Certipy

#Windows

Windows Active Directory Exploitation Cheat Sheet

Cheat sheet for Windows Active Directory exploitation

https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/

#Windows

Twitter Post

Post from Twitter platform

https://twitter.com/_dirkjan/status/1306280553281449985

#Windows

Lateral Movement Remote Services

Lateral movement through remote services

https://www.hackingarticles.in/lateral-movement-remote-services-mitret1021/

#Windows

AdPEAS

AD Privilege Escalation and Abusing Scripts

https://github.com/61106960/adPEAS

#Windows

Guide on Relaying

Comprehensive guide on relaying

https://www.trustedsec.com/blog/a-comprehensive-guide-on-relaying-anno-2022/

#Windows

Toolies

Toolies toolkit

https://github.com/expl0itabl3/Toolies

#Windows

AppLocker Bypass

Bypassing AppLocker techniques

https://github.com/o1mate/AppLocker-Bypass

#Windows

WMEye

WMEye toolkit

https://github.com/pwn1sher/WMEye

#Windows

SEKTOR7 Twitter Post

Tweet from SEKTOR7 on Twitter

https://twitter.com/SEKTOR7net

#Windows

SCShell

Shellcode injector tool

https://github.com/Mr-Un1k0d3r/SCShell

#Windows

Snaffler

Tool for automated Windows credential collection

https://github.com/SnaffCon/Snaffler

#Windows

KeeFarce

Tool for recovering passwords from KeePass databases

https://github.com/denandz/KeeFarce

#Windows

A Case Study in Wagging the Dog: Computer Takeover

Case study on Active Directory exploitation

https://blog.harmj0y.net/activedirectory/a-case-study-in-wagging-the-dog-computer-takeover/

#Windows

HarmJ0y Blog

Blog by harmj0y

https://blog.harmj0y.net/author/harmj0y/

#Windows

SharpMapExec

Tool for executing commands on Windows systems

https://github.com/cube0x0/SharpMapExec

#Windows

Utilisez le groupe Protected Users pour les admins

Guide on using the Protected Users group in Active Directory

https://www.it-connect.fr/active-directory-utilisez-le-groupe-protected-users-pour-les-admins/

#Windows

AMSI Bypass Methods

Methods for bypassing AMSI

https://pentestlaboratories.com/2021/05/17/amsi-bypass-methods/

#Windows

Pentest Laboratories Blog

Blog by Worm1984

https://pentestlaboratories.com/author/worm1984/

#Windows

Bypass Anti-Virus: Run Mimikatz

Techniques for bypassing antivirus to run Mimikatz

https://www.blackhillsinfosec.com/bypass-anti-virus-run-mimikatz/

#Windows

Black Hills InfoSec Blog

Blog by Sierra Szutz

https://www.blackhillsinfosec.com/author/sierra-szutz/

#Windows

Malwaredev Bypass AV XML

Techniques for bypassing AV using XML

https://kymb0.github.io/malwaredev-bypass-av-xml/

#Windows

RdpThief

Tool for stealing RDP credentials

https://github.com/0x09AL/RdpThief

#Windows

Offensive Golang

Offensive security toolkit in Golang

https://github.com/MrTuxx/OffensiveGolang

#Windows

BzhCTF: Bons Baisers de Russie

Write-up on BzhCTF event

https://tipi-hack.github.io/2022/04/01/bzhctf-bons-baisers-de-russie.html

#Windows

How Does Active Directory Deception Work?

Explanation of Active Directory deception techniques

https://cybertrap.com/en/blog/how-does-active-directory-deception-work/

#Windows

ldapdomaindump

Tool for dumping LDAP domain data

https://github.com/dirkjanm/ldapdomaindump

#Windows

Pentester Blog

Blog by Worm1984

https://pentester.blog/?author=1

#Windows

AV Evasion Techniques

Techniques for evading antivirus detection

https://www.purpl3f0xsecur1ty.tech/2021/03/30/av_evasion.html

#Windows

PythonForWindows

Python toolkit for Windows

https://github.com/hakril/PythonForWindows

#Windows

Relaying Credentials Everywhere with NTLMRelayx

Techniques for relaying credentials with NTLMRelayx

https://blog.fox-it.com/2017/05/09/relaying-credentials-everywhere-with-ntlmrelayx/

#Windows

PrivExchange

Tool for exploiting Exchange privileges

https://github.com/dirkjanm/privexchange/

#Windows

AzureRT

Azure Red Team toolkit

https://github.com/mgeeky/AzureRT

#Windows

SID Filter as Security Boundary between Domains

Security implications of SID filtering

https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-7-trust-account-attack-from-trusting-to-trusted

#Windows

Windows Privilege Escalation with SeBackupPrivilege

Guide on Windows privilege escalation

https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960

#Windows

MS14-068

Exploiting MS14-068 vulnerability

https://ruuand.github.io/MS14-068/

#Windows

Windows Backup Operator Attack and Detection

Exploitation and detection of Windows Backup Operator

https://systemweakness.com/expoiting-and-detecting-privilege-escalation-via-a-windows-backup-operator-attack-and-detection-a97e67644214

#Windows

Exploiting and Detecting Privilege Escalation via a Windows Backup Operator Attack and Detection

Guide on exploiting Windows Backup Operator for privilege escalation

https://systemweakness.com/expoiting-and-detecting-privilege-escalation-via-a-windows-backup-operator-attack-and-detection-a97e67644214

#Windows

Article 17

Article on security and penetration testing

https://inf0sec.fr/post.php?id=17

#Windows

Using Machine Account Passwords during an Engagement

Techniques for using machine account passwords

https://secarma.com/using-machine-account-passwords-during-an-engagement/

#Windows

adconnectdump

Tool for dumping Active Directory connector data

https://github.com/fox-it/adconnectdump

#Windows

Starkiller

Starkiller post-exploitation framework

https://github.com/BC-SECURITY/Starkiller

#Windows

Bypass AMSI by Manual Modification

Techniques for bypassing AMSI manually

https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/

#Windows

Azure AD Introduction for Red Teamers

Introduction to Azure AD for Red Teamers

https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html

#Windows

Hollows Hunter

Tool for detecting and analyzing hollowed PE files

https://github.com/hasherezade/hollows_hunter

#Windows

A Detailed Guide on Responder LLMNR Poisoning

Guide on Responder LLMNR poisoning

https://www.hackingarticles.in/a-detailed-guide-on-responder-llmnr-poisoning/

#Windows

AzureAD Attack & Defense

Azure AD attack and defense strategies

https://github.com/Cloud-Architekt/AzureAD-Attack-Defense

#Windows

CLM AppLocker

Guide on bypassing AppLocker using CLM

https://seyptoo.github.io/clm-applocker/

#Windows

Cortex XDR Analysis and Bypass

Analysis and bypass techniques for Cortex XDR

https://mrd0x.com/cortex-xdr-analysis-and-bypass/

#Windows

Contournement des protections de PowerShell 1 (Ep AMSI, CLM)

Bypassing PowerShell protections (AMS, CLM)

http://theredwindows.net/index.php/2021/05/16/contournement-des-protections-de-powershell-1-ep-amsi-clm/

#Windows

Lateral Movement using PSRemoting

Techniques for lateral movement using PSRemoting

https://klezvirus.github.io/RedTeaming/LateralMovement/LateralMovementPSRemoting/

#Windows

PowerShell Constrained Language Mode Bypass using Runspaces

Bypassing PowerShell Constrained Language Mode using Runspaces

https://www.secjuice.com/powershell-constrainted-language-mode-bypass-using-runspaces/

#Windows

AppLocker Bypass Checker

Tool for checking AppLocker bypass

https://sparcflow.github.io/GibsonBird/blob/master/chapter4/applocker-bypas-checker.ps1

#Windows

SharPersist

Persistence toolkit in PowerShell

https://github.com/mandiant/SharPersist

#Windows

ADSearch

Tool for searching Active Directory

https://github.com/tomcarver16/ADSearch

#Windows

Azure Red Team

Red team operations in Azure

https://github.com/rootsecdev/Azure-Red-Team

#Windows

Building C2 Implants in C++

Guide on building C2 implants in C++

https://shogunlab.gitbook.io/building-c2-implants-in-cpp-a-primer/

#Windows

Windows Privesc with SeBackupPrivilege

Guide on privilege escalation using SeBackupPrivilege

https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960

#Windows

Building Free Active Directory Lab in Azure

Guide on building a free Active Directory lab in Azure

https://kamran-bilgrami.medium.com/ethical-hacking-lessons-building-free-active-directory-lab-in-azure-6c67a7eddd7f

#Windows

Azurehound Cypher Cheatsheet

Cheatsheet for using Azurehound Cypher

https://hausec.com/2020/11/23/azurehound-cypher-cheatsheet/

#Windows

ROADtools

Toolkit for Red Teaming operations

https://github.com/dirkjanm/ROADtools

#Windows

CVE-2022-29072

Details on CVE-2022-29072 vulnerability

https://github.com/kagancapar/CVE-2022-29072

#Windows

DSInternals

Toolkit for Directory Services Internals

https://github.com/MichaelGrafnetter/DSInternals

#Windows

RastaMouse Twitter Post

Tweet from RastaMouse on Twitter

https://twitter.com/_RastaMouse/status/1516443366120210432

#Windows

RastaMouse Twitter

Twitter profile of RastaMouse

https://twitter.com/_RastaMouse

#Windows

Spray-AD

Tool for spraying credentials in Active Directory

https://github.com/outflanknl/Spray-AD

#Windows

Windows Callbacks

Details on Windows callbacks

http://web.archive.org/web/20200326040826/http://deniable.org/windows/windows-callbacks

#Windows

Kernel Exploitation Part 1

Introduction to Kernel Exploitation Part 1

https://www.abatchy.com/2018/01/kernel-exploitation-2

#Windows

Windows 10 EPROCESS Structure

Details on Windows 10 EPROCESS Structure

https://keramas.github.io/2020/06/21/Windows-10-2004-EPROCESS-Structure.html

#Windows

SID Filter as Security Boundary between Domains

Security implications of SID filtering

https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-7-trust-account-attack-from-trusting-to-trusted

#Windows

BadBlood

Tool for exploiting Kerberos and Active Directory

https://github.com/davidprowe/BadBlood

#Windows

DarthSidious

Tool for offensive security operations

https://github.com/chryzsh/DarthSidious

#Windows

AutomatedLab

Tool for automated lab deployment

https://github.com/AutomatedLab/AutomatedLab

#Windows

Lab Building Guide: Virtual Active Directory

Guide on building a virtual Active Directory lab

https://medium.com/@vartaisecurity/lab-building-guide-virtual-active-directory-5f0d0c8eb907

#Windows

Windows Domain Controller Vagrant

Guide on setting up Windows Domain Controller with Vagrant

https://github.com/rgl/windows-domain-controller-vagrant

#Windows

DetectionLab

Lab environment for simulating attacks

https://github.com/clong/DetectionLab

#Windows

Awesome BloodHound

Resources and tools related to BloodHound

https://github.com/chryzsh/awesome-bloodhound

#Windows

Awesome Windows Security

Collection of resources for Windows security

https://github.com/chryzsh/awesome-windows-security

#Windows

PSPKIAudit

Tool for auditing PKI certificates

https://github.com/GhostPack/PSPKIAudit

#Windows

Move Faster, Stay Longer

Techniques for improving speed and duration of operations

https://posts.specterops.io/move-faster-stay-longer-6b4efab9c644

#Windows

Certified Pre-Owned

Details on Certified Pre-Owned attacks

https://posts.specterops.io/certified-pre-owned-d95910965cd2

#Windows

Certi

Tool for working with certificates

https://github.com/zer1t0/certi

#Windows

Certified Pre-Owned

Details on Certified Pre-Owned attacks

https://posts.specterops.io/certified-pre-owned-d95910965cd2

#Windows

Driver Development Part 1

Introduction to driver development

https://www.codeproject.com/articles/9504/driver-development-part-1-introduction-to-drivers

#Windows

CVE-2022-29072

Details on CVE-2022-29072 vulnerability

https://github.com/kagancapar/CVE-2022-29072

#Windows

Windows Internals PE1

Details on Windows Internals

https://0xrick.github.io/win-internals/pe1/

#Windows

Bypassing Injection Detection

Techniques for bypassing injection detection

https://blog.redbluepurple.io/offensive-research/bypassing-injection-detection

#Windows

CS Remote Ops BOF

Tool for remote operations in C#

https://github.com/trustedsec/CS-Remote-OPs-BOF

#Windows

Pentest Everything

Guide on pentesting everything

https://viperone.gitbook.io/pentest-everything/everything/everything-active-directory

#Windows

Seth

Tool for performing ARP spoofing

https://github.com/SySS-Research/Seth

#Windows

Rakound: Notre Outil Pentest pour Tirer le Meilleur de BloodHound

Tool for optimizing BloodHound

https://www.digitemis.com/rakound-notre-outil-pentest-pour-tirer-le-meilleur-de-bloodhound/

#Windows

Inveigh

Tool for performing ARP spoofing

https://github.com/Kevin-Robertson/Inveigh

#Windows

Capturing & Relaying Net-NTLM Hashes without Kali Linux

Techniques for capturing and relaying Net-NTLM hashes

https://infinitelogins.com/2020/11/16/capturing-relaying-net-ntlm-hashes-without-kali-linux-using-inveigh/

#Windows

Vulnerable AD

Vulnerable Active Directory lab

https://github.com/WazeHell/vulnerable-AD

#Windows

ADReaper

Tool for enumeration and exploitation of Active Directory

https://github.com/AidenPearce369/ADReaper

#Windows

IPv6 Exploitation in AD Environment

Techniques for IPv6 exploitation in Active Directory

https://medium.com/@browninfosecguy/ipv6-exploitation-in-ad-environment-b22a7c3ec8af

#Windows

Domain Attacks

Various attacks on domains

https://www.puckiestyle.nl/domain-attacks/

#Windows

PPN

Tool for penetration testing infrastructure

https://snovvcrash.rocks/PPN/

#Windows

Cobalt Strike CheatSheet

Cheat sheet for Cobalt Strike operations

https://github.com/S1ckB0y1337/Cobalt-Strike-CheatSheet

#Windows

Red Teaming Tactics: Cobalt Strike Process Injection

Techniques for Cobalt Strike process injection

https://hideandsec.sh/books/red-teaming-tactics/page/cobalt-strike-process-injection

#Windows

Dive Into BloodHound

Guide on using BloodHound for Red Teaming

https://ristbs.github.io/Dive-Into-Bloodhound/

#Windows

CrackMapExec

Tool for enumeration and exploitation in Active Directory

https://mpgn.gitbook.io/crackmapexec/

#Windows

Azure AD

Introduction to Azure AD for Red Teamers

https://hideandsec.sh/books/cheatsheets-82c/page/azure-ad

#Windows

ACE to RCE

Techniques for ACE to RCE

https://sensepost.com/blog/2020/ace-to-rce/

#Windows

Wald0 Blog

Blog by Wald0

https://wald0.com/?p=112

#Windows

AD Security Descriptors

Details on Active Directory security descriptors

http://www.selfadsi.org/deep-inside/ad-security-descriptors.htm

#Windows

PowerShell IPv4PortScanner

Tool for scanning IPv4 ports using PowerShell

https://github.com/BornToBeRoot/PowerShell_IPv4PortScanner

#Windows

CME CheatSheet

Cheat sheet for various Windows commands and techniques

https://github.com/BlWasp/CME_cheatSheet

#Windows

MSSQL Cheat Sheet

Cheat sheet for MSSQL commands and techniques

https://hideandsec.sh/books/cheatsheets-82c/page/mssql

#Windows

Remote Enumeration of Network Interfaces without any Authentication: The OXID Resolver

Detailed exploration of remote enumeration using OXID Resolver

https://medium.com/nets3c/remote-enumeration-of-network-interfaces-without-any-authentication-the-oxid-resolver-896cff530d37

#Windows

The OXID Resolver - Part 1: Remote Enumeration of Network Interfaces without any Authentication

Part 1 of series on OXID Resolver by Airbus Cyber Security

https://airbus-cyber-security.com/fr/the-oxid-resolver-part-1-remote-enumeration-of-network-interfaces-without-any-authentication/

#Windows

The OXID Resolver - Part 2: Accessing a Remote Object inside DCOM

Part 2 of series on OXID Resolver by Airbus Cyber Security

https://airbus-cyber-security.com/the-oxid-resolver-part-2-accessing-a-remote-object-inside-dcom/

#Windows

DNSChef

Tool for DNS spoofing and manipulation

https://github.com/iphelix/dnschef

#Windows

Chasing the Silver PetitPotam

Exploration of PetitPotam attack techniques

https://blog.zsec.uk/chasing-the-silver-petit-potam/

#Windows

Active Directory Domain Privilege Escalation: CVE-2022-26923

Analysis of CVE-2022-26923 for AD domain privilege escalation

https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4

#Windows

Introduction to Active Directory

Basic introduction to Active Directory concepts

https://www.hackthebox.com/blog/introduction-to-active-directory

#Windows

Active Directory Tools

Tools and techniques for Active Directory enumeration and exploitation

https://www.linkedin.com/posts/kondah_tools-active-directory-activity-6930193645400645632-nYV1?utm_source=linkedin_share&utm_medium=ios_app

#Windows

Attacking Smart Card-based Active Directory Networks

Methods for attacking networks secured with smart cards in AD environments

https://ethicalchaos.dev/2020/10/04/attacking-smart-card-based-active-directory-networks/

#Windows

DCOM: Distributed Component Object Model

Overview of DCOM technology in Windows

https://www.varonis.com/fr/blog/dcom-technologie-distributed-component-object-model

#Windows

SMB Psexec, SMBExec, Winexe: How-To

Guide on using SMB-based tools for remote execution in Windows

https://nv2lt.github.io/windows/smb-psexec-smbexec-winexe-how-to/

#Windows

Get-bADpasswords

Tool for retrieving bad passwords from AD environments

https://github.com/improsec/Get-bADpasswords

#Windows

awsmBloodhoundCustomQueries

Custom queries for BloodHound in AD environments

https://github.com/awsmhacks/awsmBloodhoundCustomQueries

#Windows

SafetyKatz

Tool for extracting credentials from Windows systems

https://github.com/GhostPack/SafetyKatz

#Windows

Windbg Cheat Sheet

Cheat sheet for WinDbg debugging tool

https://github.com/repnz/windbg-cheat-sheet

#Windows

Introducing PyCobaltHound

Introduction to PyCobaltHound for threat hunting

https://blog.nviso.eu/2022/05/09/introducing-pycobalthound/?amp

#Windows

A Detailed Guide on Rubeus

Comprehensive guide on using Rubeus for attacking Active Directory

https://www.hackingarticles.in/a-detailed-guide-on-rubeus/

#Windows

Coercing NTLM Authentication from SCCM

Techniques for coercing NTLM authentication from SCCM

https://posts.specterops.io/coercing-ntlm-authentication-from-sccm-e6e23ea8260a

#Windows

SmartBrute

Tool for smart brute-forcing techniques

https://github.com/ShutdownRepo/smartbrute

#Windows

XLL Phishing

Phishing techniques using XLL files

https://github.com/Octoberfest7/XLL_Phishing

#Windows

Exploiting RBAC Using Normal User

Methods for exploiting Role-Based Access Control using normal user privileges

https://www.tiraniddo.dev/2022/05/exploiting-rbcd-using-normal-user.html

#Windows

Hunting Malware with Windows Sysinternals Process Monitor

Techniques for malware hunting using Process Monitor

https://nasbench.medium.com/hunting-malware-with-windows-sysinternals-process-monitor-e67476f44514

#Windows

GoDumpLsass

Tool for dumping LSASS memory in Go

https://github.com/Enelg52/GoDumpLsass

#Windows

Inject-Assembly

Technique for injecting assemblies into processes

https://github.com/kyleavery/inject-assembly

#Windows

A Low Dive into Kerberos Delegations

In-depth exploration of Kerberos delegation vulnerabilities

https://luemmelsec.github.io/S4fuckMe2selfAndUAndU2proxy-A-low-dive-into-Kerberos-delegations/

#Windows

Breaking All the Rules: Using Go to Call Windows API

Techniques for bypassing Windows security using Go

https://medium.com/@justen.walker/breaking-all-the-rules-using-go-to-call-windows-api-2cbfd8c79724

#Windows

Certifried: BloodHound & More AD CS Abuse

Exploration of BloodHound and AD Certificate Services abuse

https://capturethetalent.co.uk/certifried-bloodhound-more-ad-cs-abuse/

#Windows

What is ATA?

Overview of Advanced Threat Analytics in Windows environments

https://docs.microsoft.com/fr-fr/advanced-threat-analytics/what-is-ata

#Windows

Remote Enumeration of Network Interfaces without any Authentication: The OXID Resolver

Detailed exploration of remote enumeration using OXID Resolver

https://airbus-cyber-security.com/the-oxid-resolver-part-1-remote-enumeration-of-network-interfaces-without-any-authentication/

#Windows

Remote Enumeration of Network Interfaces without any Authentication: The OXID Resolver

Detailed exploration of remote enumeration using OXID Resolver

https://airbus-cyber-security.com/the-oxid-resolver-part-2-accessing-a-remote-object-inside-dcom/

#Windows

DNSChef

Tool for DNS spoofing and manipulation

https://github.com/iphelix/dnschef

#Windows

Chasing the Silver PetitPotam

Exploration of PetitPotam attack techniques

https://blog.zsec.uk/chasing-the-silver-petit-potam/

#Windows

Active Directory Domain Privilege Escalation: CVE-2022-26923

Analysis of CVE-2022-26923 for AD domain privilege escalation

https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4

#Windows

Introduction to Active Directory

Basic introduction to Active Directory concepts

https://www.hackthebox.com/blog/introduction-to-active-directory

#Windows

Active Directory Tools

Tools and techniques for Active Directory enumeration and exploitation

https://www.linkedin.com/posts/kondah_tools-active-directory-activity-6930193645400645632-nYV1?utm_source=linkedin_share&utm_medium=ios_app

#Windows

Attacking Smart Card-based Active Directory Networks

Methods for attacking networks secured with smart cards in AD environments

https://ethicalchaos.dev/2020/10/04/attacking-smart-card-based-active-directory-networks/

#Windows

DCOM: Distributed Component Object Model

Overview of DCOM technology in Windows

https://www.varonis.com/fr/blog/dcom-technologie-distributed-component-object-model

#Windows

SMB Psexec, SMBExec, Winexe: How-To

Guide on using SMB-based tools for remote execution in Windows

https://nv2lt.github.io/windows/smb-psexec-smbexec-winexe-how-to/

#Windows

Get-bADpasswords

Tool for retrieving bad passwords from AD environments

https://github.com/improsec/Get-bADpasswords

#Windows

awsmBloodhoundCustomQueries

Custom queries for BloodHound in AD environments

https://github.com/awsmhacks/awsmBloodhoundCustomQueries

#Windows

SafetyKatz

Tool for extracting credentials from Windows systems

https://github.com/GhostPack/SafetyKatz

#Windows

Windbg Cheat Sheet

Cheat sheet for WinDbg debugging tool

https://github.com/repnz/windbg-cheat-sheet

#Windows

Introducing PyCobaltHound

Introduction to PyCobaltHound for threat hunting

https://blog.nviso.eu/2022/05/09/introducing-pycobalthound/?amp

#Windows

A Detailed Guide on Rubeus

Comprehensive guide on using Rubeus for attacking Active Directory

https://www.hackingarticles.in/a-detailed-guide-on-rubeus/

#Windows

Coercing NTLM Authentication from SCCM

Techniques for coercing NTLM authentication from SCCM

https://posts.specterops.io/coercing-ntlm-authentication-from-sccm-e6e23ea8260a

#Windows

SmartBrute

Tool for smart brute-forcing techniques

https://github.com/ShutdownRepo/smartbrute

#Windows

XLL Phishing

Phishing techniques using XLL files

https://github.com/Octoberfest7/XLL_Phishing

#Windows

Exploiting RBAC Using Normal User

Methods for exploiting Role-Based Access Control using normal user privileges

https://www.tiraniddo.dev/2022/05/exploiting-rbcd-using-normal-user.html

#Windows

Hunting Malware with Windows Sysinternals Process Monitor

Techniques for malware hunting using Process Monitor

https://nasbench.medium.com/hunting-malware-with-windows-sysinternals-process-monitor-e67476f44514

#Windows

GoDumpLsass

Tool for dumping LSASS memory in Go

https://github.com/Enelg52/GoDumpLsass

#Windows

Inject-Assembly

Technique for injecting assemblies into processes

https://github.com/kyleavery/inject-assembly

#Windows

A Low Dive into Kerberos Delegations

In-depth exploration of Kerberos delegation vulnerabilities

https://luemmelsec.github.io/S4fuckMe2selfAndUAndU2proxy-A-low-dive-into-Kerberos-delegations/

#Windows

Breaking All the Rules: Using Go to Call Windows API

Techniques for bypassing Windows security using Go

https://medium.com/@justen.walker/breaking-all-the-rules-using-go-to-call-windows-api-2cbfd8c79724

#Windows

Certifried: BloodHound & More AD CS Abuse

Exploration of BloodHound and AD Certificate Services abuse

https://capturethetalent.co.uk/certifried-bloodhound-more-ad-cs-abuse/

#Windows

What is ATA?

Overview of Advanced Threat Analytics in Windows environments

https://docs.microsoft.com/fr-fr/advanced-threat-analytics/what-is-ata

#Windows

Remote Enumeration of Network Interfaces without any Authentication: The OXID Resolver

Detailed exploration of remote enumeration using OXID Resolver

https://airbus-cyber-security.com/the-oxid-resolver-part-1-remote-enumeration-of-network-interfaces-without-any-authentication/

#Windows

Remote Enumeration of Network Interfaces without any Authentication: The OXID Resolver

Detailed exploration of remote enumeration using OXID Resolver

https://airbus-cyber-security.com/the-oxid-resolver-part-2-accessing-a-remote-object-inside-dcom/

#Windows

DNSChef

Tool for DNS spoofing and manipulation

https://github.com/iphelix/dnschef

#Windows

Chasing the Silver PetitPotam

Exploration of PetitPotam attack techniques

https://blog.zsec.uk/chasing-the-silver-petit-potam/

#Windows

Active Directory Domain Privilege Escalation: CVE-2022-26923

Analysis of CVE-2022-26923 for AD domain privilege escalation

https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4

#Windows

Introduction to Active Directory

Basic introduction to Active Directory concepts

https://www.hackthebox.com/blog/introduction-to-active-directory

#Windows

Active Directory Tools

Tools and techniques for Active Directory enumeration and exploitation

https://www.linkedin.com/posts/kondah_tools-active-directory-activity-6930193645400645632-nYV1?utm_source=linkedin_share&utm_medium=ios_app

#Windows

Attacking Smart Card-based Active Directory Networks

Methods for attacking networks secured with smart cards in AD environments

https://ethicalchaos.dev/2020/10/04/attacking-smart-card-based-active-directory-networks/

#Windows

DCOM: Distributed Component Object Model

Overview of DCOM technology in Windows

https://www.varonis.com/fr/blog/dcom-technologie-distributed-component-object-model

#Windows

SMB Psexec, SMBExec, Winexe: How-To

Guide on using SMB-based tools for remote execution in Windows

https://nv2lt.github.io/windows/smb-psexec-smbexec-winexe-how-to/

#Windows

Get-bADpasswords

Tool for retrieving bad passwords from AD environments

https://github.com/improsec/Get-bADpasswords

#Windows

awsmBloodhoundCustomQueries

Custom queries for BloodHound in AD environments

https://github.com/awsmhacks/awsmBloodhoundCustomQueries

#Windows

SafetyKatz

Tool for extracting credentials from Windows systems

https://github.com/GhostPack/SafetyKatz

#Windows

Windbg Cheat Sheet

Cheat sheet for WinDbg debugging tool

https://github.com/repnz/windbg-cheat-sheet

#Windows

Introducing PyCobaltHound

Introduction to PyCobaltHound for threat hunting

https://blog.nviso.eu/2022/05/09/introducing-pycobalthound/?amp

#Windows

A Detailed Guide on Rubeus

Comprehensive guide on using Rubeus for attacking Active Directory

https://www.hackingarticles.in/a-detailed-guide-on-rubeus/

#Windows

Coercing NTLM Authentication from SCCM

Techniques for coercing NTLM authentication from SCCM

https://posts.specterops.io/coercing-ntlm-authentication-from-sccm-e6e23ea8260a

#Windows

SmartBrute

Tool for smart brute-forcing techniques

https://github.com/ShutdownRepo/smartbrute

#Windows

XLL Phishing

Phishing techniques using XLL files

https://github.com/Octoberfest7/XLL_Phishing

#Windows

Exploiting RBAC Using Normal User

Methods for exploiting Role-Based Access Control using normal user privileges

https://www.tiraniddo.dev/2022/05/exploiting-rbcd-using-normal-user.html

#Windows

Hunting Malware with Windows Sysinternals Process Monitor

Techniques for malware hunting using Process Monitor

https://nasbench.medium.com/hunting-malware-with-windows-sysinternals-process-monitor-e67476f44514

#Windows

GoDumpLsass

Tool for dumping LSASS memory in Go

https://github.com/Enelg52/GoDumpLsass

#Windows

Inject-Assembly

Technique for injecting assemblies into processes

https://github.com/kyleavery/inject-assembly

#Windows

A Low Dive into Kerberos Delegations

In-depth exploration of Kerberos delegation vulnerabilities

https://luemmelsec.github.io/S4fuckMe2selfAndUAndU2proxy-A-low-dive-into-Kerberos-delegations/

#Windows

Breaking All the Rules: Using Go to Call Windows API

Techniques for bypassing Windows security using Go

https://medium.com/@justen.walker/breaking-all-the-rules-using-go-to-call-windows-api-2cbfd8c79724

#Windows

Certifried: BloodHound & More AD CS Abuse

Exploration of BloodHound and AD Certificate Services abuse

https://capturethetalent.co.uk/certifried-bloodhound-more-ad-cs-abuse/

#Windows

What is ATA?

Overview of Advanced Threat Analytics in Windows environments

https://docs.microsoft.com/fr-fr/advanced-threat-analytics/what-is-ata

#Windows

Remote Enumeration of Network Interfaces without any Authentication: The OXID Resolver

Detailed exploration of remote enumeration using OXID Resolver

https://airbus-cyber-security.com/the-oxid-resolver-part-1-remote-enumeration-of-network-interfaces-without-any-authentication/

#Windows

Remote Enumeration of Network Interfaces without any Authentication: The OXID Resolver

Detailed exploration of remote enumeration using OXID Resolver

https://airbus-cyber-security.com/the-oxid-resolver-part-2-accessing-a-remote-object-inside-dcom/

#Windows

DNSChef

Tool for DNS spoofing and manipulation

https://github.com/iphelix/dnschef

#Windows

Chasing the Silver PetitPotam

Exploration of PetitPotam attack techniques

https://blog.zsec.uk/chasing-the-silver-petit-potam/

#Windows

Active Directory Domain Privilege Escalation: CVE-2022-26923

Analysis of CVE-2022-26923 for AD domain privilege escalation

https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4

#Windows

Introduction to Active Directory

Basic introduction to Active Directory concepts

https://www.hackthebox.com/blog/introduction-to-active-directory

#Windows

Active Directory Tools

Tools and techniques for Active Directory enumeration and exploitation

https://www.linkedin.com/posts/kondah_tools-active-directory-activity-6930193645400645632-nYV1?utm_source=linkedin_share&utm_medium=ios_app

#Windows

Attacking Smart Card-based Active Directory Networks

Methods for attacking networks secured with smart cards in AD environments

https://ethicalchaos.dev/2020/10/04/attacking-smart-card-based-active-directory-networks/

#Windows

Attacking Smart Card-based Active Directory Networks

Methods for attacking networks secured with smart cards in AD environments

https://ethicalchaos.dev/author/ceri-coburn/

#Windows

DCOM: Distributed Component Object Model

Overview of DCOM technology in Windows

https://www.varonis.com/fr/blog/dcom-technologie-distributed-component-object-model

#Windows

SMB Psexec, SMBExec, Winexe: How-To

Guide on using SMB-based tools for remote execution in Windows

https://nv2lt.github.io/windows/smb-psexec-smbexec-winexe-how-to/

#Windows

Get-bADpasswords

Tool for retrieving bad passwords from AD environments

https://github.com/improsec/Get-bADpasswords

#Windows

awsmBloodhoundCustomQueries

Custom queries for BloodHound in AD environments

https://github.com/awsmhacks/awsmBloodhoundCustomQueries

#Windows

SafetyKatz

Tool for extracting credentials from Windows systems

https://github.com/GhostPack/SafetyKatz

#Windows

Windbg Cheat Sheet

Cheat sheet for WinDbg debugging tool

https://github.com/repnz/windbg-cheat-sheet

#Windows

Introducing PyCobaltHound

Introduction to PyCobaltHound for threat hunting

https://blog.nviso.eu/2022/05/09/introducing-pycobalthound/?amp

#Windows

A Detailed Guide on Rubeus

Comprehensive guide on using Rubeus for attacking Active Directory

https://www.hackingarticles.in/a-detailed-guide-on-rubeus/

#Windows

Coercing NTLM Authentication from SCCM

Techniques for coercing NTLM authentication from SCCM

https://posts.specterops.io/coercing-ntlm-authentication-from-sccm-e6e23ea8260a

#Windows

SmartBrute

Tool for smart brute-forcing techniques

https://github.com/ShutdownRepo/smartbrute

#Windows

XLL Phishing

Phishing techniques using XLL files

https://github.com/Octoberfest7/XLL_Phishing

#Windows

Exploiting RBAC Using Normal User

Methods for exploiting Role-Based Access Control using normal user privileges

https://www.tiraniddo.dev/2022/05/exploiting-rbcd-using-normal-user.html

#Windows

Hunting Malware with Windows Sysinternals Process Monitor

Techniques for malware hunting using Process Monitor

https://nasbench.medium.com/hunting-malware-with-windows-sysinternals-process-monitor-e67476f44514

#Windows

GoDumpLsass

Tool for dumping LSASS memory in Go

https://github.com/Enelg52/GoDumpLsass

#Windows

Inject-Assembly

Technique for injecting assemblies into processes

https://github.com/kyleavery/inject-assembly

#Windows

A Low Dive into Kerberos Delegations

In-depth exploration of Kerberos delegation vulnerabilities

https://luemmelsec.github.io/S4fuckMe2selfAndUAndU2proxy-A-low-dive-into-Kerberos-delegations/

#Windows

Breaking All the Rules: Using Go to Call Windows API

Techniques for bypassing Windows security using Go

https://medium.com/@justen.walker/breaking-all-the-rules-using-go-to-call-windows-api-2cbfd8c79724

#Windows

Certifried: BloodHound & More AD CS Abuse

Exploration of BloodHound and AD Certificate Services abuse

https://capturethetalent.co.uk/certifried-bloodhound-more-ad-cs-abuse/

#Windows

What is ATA?

Overview of Advanced Threat Analytics in Windows environments

https://docs.microsoft.com/fr-fr/advanced-threat-analytics/what-is-ata

#Windows

Twitter - Malmoeb

Tweet about Active Directory techniques

https://twitter.com/malmoeb/status/1530862908871163905?t=Zrn9YCWY0Y7clMRsx7FybQ&s=19

#Windows

Twitter - Deepakkeshav98

Kerberos attacks and detections in Windows environments

https://medium.com/@deepakkeshav98/3-machine-lab-3-kerberos-attacks-and-detections-d0e4548d94d1

#Windows

Mandiant - Hunting COM Objects

Techniques for hunting COM objects in Windows

https://www.mandiant.com/resources/hunting-com-objects

#Windows

SecureAuth - Kerberos Delegation, SPNs, and More

Overview of Kerberos delegation and SPNs in Windows AD

https://www.secureauth.com/blog/kerberos-delegation-spns-and-more/

#Windows

SecureAuth - TTan

Author page on SecureAuth discussing Windows security topics

https://www.secureauth.com/author/ttan/

#Windows

Rakound

Tool for reconnaissance and enumeration in Active Directory

https://github.com/digitemis/Rakound

#Windows

BloodHound Tools - DBCreator

Tool for creating databases in BloodHound for AD analysis

https://github.com/BloodHoundAD/BloodHound-Tools/tree/master/DBCreator

#Windows

PingCastle

Tool for Active Directory security assessments and reporting

https://github.com/vletoux/pingcastle

#Windows

SpecterOps - Cobalt Strike

Articles and techniques related to Cobalt Strike

https://posts.specterops.io/tagged/cobalt-strike

#Windows

HelpSystems - Cobalt Strike Artifacts and Antivirus Sleep Mask Kit

Documentation on artifacts and antivirus evasion in Cobalt Strike

https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/artifacts-antivirus_sleep-mask-kit.htm

#Windows

Optiv - ScareCrow

Tool for evading detection in Windows environments

https://github.com/optiv/ScareCrow

#Windows

Ilearned - Lancelot

Author page discussing various Windows security topics

https://blog.ilearned.eu/author/lancelot.html

#Windows

Invoke-PSImage

Tool for embedding PowerShell scripts into PNG files

https://github.com/peewpw/Invoke-PSImage

#Windows

Cerbero

Tool for decoding and analyzing malicious files

https://github.com/Zer1t0/cerbero

#Windows

S-500-G2-Rat-Hvnc-Hidden-Broswers-Hidden-Apps-OperaGX-Rat-Remote-Malware

Tool for remote malware and RAT control in Windows

https://github.com/MerlynXS/S-500-G2-Rat-Hvnc-Hidden-Broswers-Hidden-Apps-OperaGX-Rat-Remote-Malware

#Windows

LinkedIn - er23ncT4

LinkedIn post related to Windows security

https://lnkd.in/er23ncT4

#Windows

linWinPwn

Tool for Windows privilege escalation

https://github.com/lefayjey/linWinPwn

#Windows

Slideshare - SanjivKawa

Slideshare presentation on exploiting MS SQL using SQL Recon

https://slideshare.net/SanjivKawa/abusing-ms-sql-using-sqlrecon

#Windows

RunasCs

Tool for running processes with elevated privileges in Windows

http://buaq.net/go-72951.html

#Windows

Unsafe.sh - go-61472

Technical information on Windows security

https://unsafe.sh/go-61472.html

#Windows

Remyhax - Do Harm

Blog post on performing malicious actions in Windows environments

https://remyhax.xyz/posts/do-harm/

#Windows

Twitter Video

Twitter video related to Windows security

https://video.twimg.com/tweet_video/D4DQoemW4AAvuad.mp4

#Windows

Kekeo KUHL M TSSSP

Tool for exploiting Kerberos in Windows environments

https://ristbs.github.io/Kekeo-KUHL_M_TSSSP/

#Windows

Errno.fr - OutlookDecrypt

Tool for decrypting Outlook data in Windows

https://www.errno.fr/OutlookDecrypt/OutlookDecrypt.html

#Windows

Jailbreak

Tool for bypassing Windows security mechanisms

https://github.com/iSECPartners/jailbreak

#Windows

Invoke-UserSimulator

Tool for simulating user activity in Windows environments

https://github.com/ubeeri/Invoke-UserSimulator

#Windows

Microsoft Security Blog - Office VBA AMSI

Article on Office VBA and AMSI in Windows

https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/

#Windows

Rift - Lazarus Shellcode Execution Method

Analysis of Lazarus shellcode execution methods in Windows

https://research.nccgroup.com/2021/01/23/rift-analysing-a-lazarus-shellcode-execution-method/

#Windows

PyWhisker

Tool for identifying vulnerabilities in Windows

https://github.com/ShutdownRepo/pywhisker

#Windows

ConsultingIT - Active Directory Security with BloodHound

Article on Active Directory security using BloodHound

https://www.consultingit.fr/fr/?option=com_content&view=article&id=688:active-directory-securite-avec-bloodhound-en-pentest&catid=31

#Windows

Akerva - Wonkachall 2 LeHack 2019 Write-Up

Write-up on LeHack 2019 focusing on Windows security

https://akerva.com/blog/wonkachall-2-lehack-2019-write-up-part-2-windows/

#Windows

CptJesus Blog

Blog discussing various Windows security topics

https://blog.cptjesus.com/

#Windows

Inceptor - Bypass AV-EDR Solutions Combining Well Known Techniques

Slides on bypassing AV and EDR solutions in Windows

https://github.com/klezVirus/inceptor/blob/main/slides/Inceptor%20-%20Bypass%20AV-EDR%20solutions%20combining%20well%20known%20techniques.pdf

#Windows

DFSCoerce

Tool for coercing DFS in Windows environments

https://github.com/Wh04m1001/DFSCoerce

#Windows

Gist - sckalath

Gist discussing Windows security techniques

https://gist.github.com/sckalath/ec7af6a1786e3de6c309

#Windows

Taowu Cobalt Strike

Tool for using Cobalt Strike for offensive security in Windows

https://github.com/pandasec888/taowu-cobalt-strike

#Windows

JosephKingstone - Cobalt Strike Extension Kit

Extension kit for Cobalt Strike in Windows environments

https://github.com/josephkingstone/cobalt_strike_extension_kit/

#Windows

PEASS-ng - WinPEAS

Windows Privilege Escalation Awesome Scripts Suite - WinPEAS

https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS

#Windows

HackTricks - Windows Local Privilege Escalation

Guide on local privilege escalation in Windows

https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation

#Windows

SadProcessor - HandsOnBloodHound

Hands-on exercises with BloodHound for AD security

https://github.com/SadProcessor/HandsOnBloodHound

#Windows

SadProcessor - CypherDog

Tool for running custom queries in BloodHound

https://github.com/SadProcessor/CypherDog

#Windows

Thalpius

Website discussing various Windows security topics

https://thalpius.com/

#Windows

DavidProwe - BadBlood

Tool for assessing trust relationships in AD environments

https://github.com/davidprowe/BadBlood

#Windows

SpecterOps - Attacking Azure AD and Introducing PowerZure

Techniques for attacking Azure AD and PowerZure introduction

https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a

#Windows

lkarlslund - adalanche

Tool for Active Directory enumeration and exploitation

https://github.com/lkarlslund/adalanche

#Windows

HideAndSec - Active Directory Python Edition

Cheatsheets for Active Directory in Python

https://hideandsec.sh/books/cheatsheets-82c/page/active-directory-python-edition

#Windows

Karol-Mazurek95 - Crimson Wisp

Article discussing Windows security techniques

https://karol-mazurek95.medium.com/crimson-wisp-994cbcd1d0bb

#Windows

HackingLZ - ExtractedDefender

Tool for extracting and analyzing Windows Defender data

https://github.com/HackingLZ/ExtractedDefender

#Windows

NVISO - Breaking Out of Windows Kiosks Using Only Microsoft Edge

Methodologies for breaking out of Windows kiosks using Edge

https://blog.nviso.eu/2022/05/24/breaking-out-of-windows-kiosks-using-only-microsoft-edge/

#Windows

Orange-Cyberdefense - ADCS Workshop

Workshop on Active Directory Certificate Services exploitation

https://github.com/Orange-Cyberdefense/leHACK-2022/blob/main/Workshop-ADCS-leHACK-2022-v1.0.pdf

#Windows

Orange-Cyberdefense - Exploitation de Tokens Windows

Talk on exploitation of Windows tokens

https://github.com/Orange-Cyberdefense/leHACK-2022/blob/main/Talk-Exploitation-de-tokens-Windows-leHACK-2022-v1.0.pdf

#Windows

mgeeky - Handy BloodHound Cypher Queries

Useful BloodHound Cypher queries for AD security

https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/red-teaming/bloodhound/Handy-BloodHound-Cypher-Queries.md

#Windows

Jumpsec Labs - Obfuscating C2 During a Red Team Engagement

Techniques for obfuscating C2 during red team engagements

https://labs.jumpsec.com/obfuscating-c2-during-a-red-team-engagement/

#Windows

Twitter - _xpn_

Tweet related to Windows security

https://twitter.com/_xpn_/status/1542837007382110208

#Windows

matthieu-hackwitharts - Win32 Offensive Cheatsheet

Cheatsheet for offensive techniques in Windows

https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet

#Windows

ADSecurity - How Kerberos Works

Explanation of Kerberos authentication in Windows

https://www.tarlogic.com/blog/how-kerberos-works/

#Windows

KernelDataStructureFinder

Tool for finding kernel data structures in Windows

https://github.com/yardenshafir/KernelDataStructureFinder

#Windows

Microsoft Security Blog - Process Creation Properties

Using process creation properties to catch evasion techniques in Windows

https://www.microsoft.com/security/blog/2022/06/30/using-process-creation-properties-to-catch-evasion-techniques/

#Windows

ClearBlueJar - From NtObjectManager to PetitPotam

Techniques from NtObjectManager to PetitPotam in Windows

https://clearbluejar.github.io/posts/from-ntobjectmanager-to-petitpotam/

#Windows

Cybergeeks - Reverse Engineering PsExec

Reverse engineering PsExec for knowledge and fun

https://cybergeeks.tech/reverse-engineering-psexec-for-fun-and-knowledge/

#Windows

Twitter - Podalirius_

Tweet related to Windows security

https://twitter.com/podalirius_/status/1545044317844099072

#Windows

Twitter - Podalirius_ Video

Twitter video related to Windows security

https://twitter.com/podalirius_/status/1545058556038336512

#Windows

evilmog - ntlmv1-multi

Tool for performing NTLMv1 authentication attacks in Windows

https://github.com/evilmog/ntlmv1-multi

#Windows

nidem - kerberoast

Tool for Kerberoasting in Windows environments

https://github.com/nidem/kerberoast

#Windows

Pentester.blog - Windows Privilege Escalation

Guide on Windows privilege escalation techniques

https://pentester.blog/?p=794

#Windows

HideAndSec - Windows SNL

Cheatsheets for Windows security

https://hideandsec.sh/books/windows-sNL/page/in-the-potato-family-i-want-them-all

#Windows

Gerenios - AADInternals

Tool for managing Azure AD environments

https://github.com/Gerenios/AADInternals

#Windows

0xJs - CARTP Cheatsheet

Cheatsheet for CARTP techniques in Windows environments

https://github.com/0xJs/CARTP-cheatsheet/

#Windows

NetSPI - MicroBurst

Tool for extracting data from Microsoft Windows operating systems

https://github.com/NetSPI/MicroBurst

#Windows

Synacktiv - Azure AD Introduction for Red Teamers

Introduction to Azure AD for red teamers

https://www.synacktiv.com/publications/azure-ad-introduction-for-red-teamers.html

#Windows

LMGsec - o365creeper

Tool for auditing and maintaining Microsoft 365 environments

https://github.com/LMGsec/o365creeper

#Windows

Dirkjanm.io - Updating ADConnectDump

Journey into DPAPI and updating ADConnectDump

https://dirkjanm.io/updating-adconnectdump-a-journey-into-dpapi/

#Windows

HackTricks - Active Directory Methodology

Methodology for Active Directory penetration testing

https://book.hacktricks.xyz/windows-hardening/active-directory-methodology

#Windows

Offsec-Journey - Attacking MS SQL Servers

Methods for attacking MS SQL Servers

https://www.offsec-journey.com/post/attacking-ms-sql-servers

#Windows

Cloud-Architekt - AzureAD Attack Defense

Defense strategies against Azure AD attacks

https://github.com/Cloud-Architekt/AzureAD-Attack-Defense

#Windows

BlackLanternSecurity - MANSPIDER

Tool for managing SPIDER activities in Windows environments

https://github.com/blacklanternsecurity/MANSPIDER

#Windows

lgandx - PCredz

Tool for dumping credentials in Windows environments

https://github.com/lgandx/PCredz

#Windows

HackerHouse-iscsicpl_bypassUAC

Tool for bypassing UAC in Windows environments

https://github.com/hackerhouse-opensource/iscsicpl_bypassUAC

#Windows

Persistence-Info

Techniques for achieving persistence in Windows

https://persistence-info.github.io/

#Windows

Twitter - mpgn_x64

Tweet related to Windows security

https://twitter.com/mpgn_x64/status/1549150980859650053?s=21&t=8ptdY28LX_7SwMSXpwKKBg

#Windows

Twitter - nas_bench

Tweet related to Windows security

https://twitter.com/nas_bench/status/1550836225652686848?t=4Dn1Hd8bVqyH1Z8iNeCfzw&s=19

#Windows

Twitter - _Mayyhem

Tweet related to Windows security

https://twitter.com/_Mayyhem/status/1540338845832679424

#Windows

mgeeky - ProtectMyTooling

Tool for protecting tools used in penetration testing

https://github.com/mgeeky/ProtectMyTooling

#Windows

SecIdiot - FOLIAGE

Tool for exploiting vulnerabilities in Windows environments

https://github.com/SecIdiot/FOLIAGE

#Windows

Azure_Workshop

Workshop on Azure security practices

https://github.com/mandiant/Azure_Workshop

#Windows

Untangling Knotweed - European Private Sector Offensive Actor Using 0-day Exploits

Analysis of a European offensive actor exploiting 0-day exploits

https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/

#Windows

Author - eRavena

Posts authored by eRavena on Microsoft security blog

https://www.microsoft.com/security/blog/author/eravena/

#Windows

SharpBypassUAC

Tool for bypassing UAC controls in Windows

https://github.com/FatRodzianko/SharpBypassUAC

#Windows

AssemblyCompressor

Tool for compressing assembly code

https://github.com/zacbre/AssemblyCompressor

#Windows

Mangle

Tool for performing manipulation attacks

https://github.com/optiv/Mangle

#Windows

Malware Development for Dummies - Hack in Paris 2022

Slides on malware development presented at Hack in Paris 2022

https://github.com/chvancooten/maldev-for-dummies/blob/main/Slides/Malware%20Development%20for%20Dummies%20-%20Hack%20in%20Paris%2030-06-2022%20%26%2001-07-2022.pdf

#Windows

SliverC2 OPSEC Notes

Operational security notes for SliverC2 usage

https://red-actor.notion.site/SliverC2-OPSEC-Notes-b0dc84158cdb4ee48b06f66fd21c5ec2

#Windows

Adcoding

Website dedicated to Active Directory coding techniques

http://adcoding.com/

#Windows

Certipy 4.0 ESC9/ESC10 BloodHound GUI

New authentication and request methods in Certipy 4.0

https://research.ifcr.dk/certipy-4-0-esc9-esc10-bloodhound-gui-new-authentication-and-request-methods-and-more-7237d88061f7?gi=ef2d0840ab10

#Windows

How I Met Your Beacon - Part 3: Brute RateL

Exploring the Brute RateL technique in beacon communication

https://www.mdsec.co.uk/2022/08/part-3-how-i-met-your-beacon-brute-ratel/

#Windows

Setting Up QEMU Kernel Mode Debugging Using EXDI

Guide on setting up QEMU for kernel mode debugging

https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/setting-up-qemu-kernel-mode-debugging-using-exdi

#Windows

TeamFiltration

Tool for filtering team communications

https://github.com/Flangvik/TeamFiltration

#Windows

Cleartext Shenanigans - Gifting User Passwords to Adversaries with NPPSpy

Analysis on cleartext password exposure via NPPSpy

https://www.huntress.com/blog/cleartext-shenanigans-gifting-user-passwords-to-adversaries-with-nppspy?hss_channel=tw-3330464153

#Windows

PSBits - PasswordStealing/NPPSpy

Tool for stealing passwords using NPPSpy

https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy

#Windows

LUEMMELSEC

Website featuring security articles and tools

https://luemmelsec.github.io/

#Windows

Rg-adguard

Store for Microsoft Store applications

https://store.rg-adguard.net/

#Windows

LDAPPER

Tool for managing LDAP environments

https://github.com/shellster/LDAPPER

#Windows

Useful LDAP Queries for Windows Active Directory Pentesting

Slides on useful LDAP queries for AD pentesting

https://podalirius.net/en/articles/useful-ldap-queries-for-windows-active-directory-pentesting/

#Windows

StandIn

Tool for simulating user behavior

https://github.com/FuzzySecurity/StandIn

#Windows

Another Word on Delegation

Insights on delegation in Windows environments

https://blog.harmj0y.net/redteaming/another-word-on-delegation/

#Windows

Author - harmj0y

Posts authored by harmj0y on their blog

https://blog.harmj0y.net/author/harmj0y/

#Windows

Masky Release v0.0.3

Release notes for Masky v0.0.3

https://z4ksec.github.io/posts/masky-release-v0.0.3/

#Windows

Exploiting Windows Group Policy Preferences

Techniques for exploiting Windows Group Policy Preferences

https://podalirius.net/en/articles/exploiting-windows-group-policy-preferences/

#Windows

How Threat Actors Are Adapting Post-Macro World

Analysis on threat actor tactics post-Macro world

https://www.proofpoint.com/us/blog/threat-insight/how-threat-actors-are-adapting-post-macro-world

#Windows

DirSync

Overview of DirSync functionality

https://simondotsh.com/infosec/2022/07/11/dirsync.html

#Windows

Author - snovvcrash

Posts by snovvcrash on Twitter

https://twitter.com/snovvcrash/status/1564606422184345604?s=21&t=1z_8lCnLv-dAfcbLrLpUcA

#Windows

Author - d4rksystem

Posts by d4rksystem on Twitter

https://twitter.com/d4rksystem/status/1564313431569825792?t=qixpxUc3-z2PrC1IALYAdw&s=19

#Windows

DLL Proxying

Techniques for DLL proxying

https://0x0ff537.github.io/post/dllproxying/

#Windows

Author - gray_sec

Posts by gray_sec on Twitter

https://twitter.com/gray_sec/status/1565396721336815617

#Windows

Author - RemkoWeijnen

Posts by RemkoWeijnen on Twitter

https://twitter.com/remkoweijnen/status/1565051115716153345?s=21&t=doVxZbyr0aRwE4JWJxXYMQ

#Windows

Ninja_UUID_Runner

Tool for running UUID operations

https://github.com/boku7/Ninja_UUID_Runner

#Windows

Macro Pack

Tool for managing macros

https://github.com/sevagas/macro_pack

#Windows

Windows Drivers Reverse Engineering Methodology

Methodology for reverse engineering Windows drivers

https://voidsec.com/windows-drivers-reverse-engineering-methodology/

#Windows

HiderDrv

Tool for hiding drivers in Windows environments

https://github.com/CZashi/HiderDrv

#Windows

ldapnomnom

Tool for LDAP enumeration

https://github.com/lkarlslund/ldapnomnom

#Windows

Elevator

Tool for privilege escalation

https://github.com/Kudaes/Elevator

#Windows

JuicyPotatoNG

Tool for privilege escalation using JuicyPotato technique

https://github.com/antonioCoco/JuicyPotatoNG

#Windows

Giving JuicyPotato a Second Chance - JuicyPotatoNG

Discussion on improvements in JuicyPotatoNG

https://decoder.cloud/2022/09/21/giving-juicypotato-a-second-chance-juicypotatong/

#Windows

MS17-010

Exploit for MS17-010 vulnerability

https://github.com/worawit/MS17-010

#Windows

AzAdvertizer

Tool for analyzing Azure AD environments

https://www.azadvertizer.net/index.html

#Windows

Author - HackerOtter

Posts by HackerOtter on Twitter

https://twitter.com/hackerotter/status/1573320493033299968?s=46&t=IdrRXKl6NiJwSSs-6ZUZ9A

#Windows

linWinPwn

Tools for Linux and Windows penetration testing

https://github.com/lefayjey/linWinPwn

#Windows

WinPwn

Tool for Windows penetration testing

https://github.com/S3cur3Th1sSh1t/WinPwn

#Windows

Skidaddle-Skideldi - I Just Pwnd Your PKI

Exploiting PKI vulnerabilities

https://luemmelsec.github.io/Skidaddle-Skideldi-I-just-pwnd-your-PKI/

#Windows

ShiftF10Bypass and PrivEsc

Bypass and privilege escalation techniques using Shift+F10

https://k4m1ll0.com/ShiftF10Bypass-and-privesc.html

#Windows

Signature vs Behavior

Comparison of signature-based vs behavior-based detection

https://s3cur3th1ssh1t.github.io/Signature_vs_Behaviour/

#Windows

Fileless Remote PE

Techniques for executing remote PE files in a fileless manner

https://github.com/D1rkMtr/FilelessRemotePE

#Windows

DumpThatLSASS

Tool for dumping LSASS memory contents

https://github.com/D1rkMtr/DumpThatLSASS

#Windows

HandleKatz

Tool for manipulating handle permissions

https://github.com/codewhitesec/HandleKatz

#Windows

Token Theft - Part 1

Tutorial on token theft techniques

https://cocomelonc.github.io/tutorial/2022/09/25/token-theft-1.html

#Windows

Dumping LSASS with Duplicated Handles

Techniques for dumping LSASS using duplicated handles

https://rastamouse.me/dumping-lsass-with-duplicated-handles/

#Windows

LazySign

Tool for signing executables

https://github.com/jfmaes/LazySign

#Windows

Active Directory Certificate Services Abuse

Abusing AD Certificate Services for attacks

https://rayrt.gitlab.io/posts/Active-Directory-Certificate-Services-Abuse/

#Windows

New Attack Paths as Requested by STS

Discussion on new attack paths in STS

https://www.semperis.com/blog/new-attack-paths-as-requested-sts/

#Windows

Misc PowerShell Scripts

Collection of miscellaneous PowerShell scripts

https://github.com/rvrsh3ll/Misc-Powershell-Scripts

#Windows

Exploit

General repository for exploits

https://github.com/Ph33rr/Exploit

#Windows

RITM

Tool for managing incident response tasks

https://github.com/Tw1sm/RITM

#Windows

NoPowerShell

Tool for bypassing PowerShell restrictions

https://github.com/bitsadmin/nopowershell

#Windows

Exchange Fingerprinter.py

Tool for fingerprinting Exchange servers

https://github.com/tijldeneut/Security/blob/master/Exchange-fingerprinter.py

#Windows

Detecting and Preventing LSASS Credential Dumping Attacks

Best practices for detecting and preventing LSASS attacks

http://www.microsoft.com/security/blog/2022/10/05/detecting-and-preventing-lsass-credential-dumping-attacks/

#Windows

A Syscall Journey in the Windows Kernel

Exploring system calls in the Windows kernel

https://alice.climent-pommeret.red/posts/a-syscall-journey-in-the-windows-kernel/

#Windows

OSINT Techniques

Guide on OSINT techniques

https://aadinternals.com/osint/

#Windows

RustHound

Tool for Rust programming language security testing

https://github.com/OPENCYBER-FR/RustHound

#Windows

ZeroLogon

Overview of ZeroLogon vulnerability

https://0xss0rz.github.io/2021-05-31-ZeroLogon/

#Windows

BloodHound.py - Kerberos

Using BloodHound.py with Kerberos

https://github.com/jazzpizazz/BloodHound.py-Kerberos.git

#Windows

Resource-Based Constrained Delegation AD Computer Object Takeover

Techniques for AD computer object takeover

https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/resource-based-constrained-delegation-ad-computer-object-take-over-and-privilged-code-execution

#Windows

Kerberos Linux Windows AD

Integration of Kerberos between Linux and Windows AD

https://www.vgemba.net/microsoft/Kerberos-Linux-Windows-AD/

#Windows

AD CS Misconfigurations

Analysis of AD CS misconfigurations

https://http418infosec.com/ad-cs-what-can-be-misconfigured

#Windows

WinBindex

Search engine for Windows binaries

https://winbindex.m417z.com/

#Windows

Win32 Offensive Cheatsheet

Cheat sheet for offensive techniques in Win32 environments

https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet

#Windows

Locksmith

Tool for managing Windows locks

https://github.com/TrimarcJake/Locksmith

#Windows

Abusing Windows Tokens to Compromise Active Directory

Techniques for abusing Windows tokens

https://sensepost.com/blog/2022/abusing-windows-tokens-to-compromise-active-directory-without-touching-lsass/

#Windows

CVE-2020-17049 Kerberos Bronze Bit Overview

Overview of CVE-2020-17049 Kerberos Bronze Bit

https://www.netspi.com/blog/technical/network-penetration-testing/cve-2020-17049-kerberos-bronze-bit-overview/

#Windows

CVE-2022-33679 Analysis and POC

Analysis and proof of concept for CVE-2022-33679

https://www.login-securite.com/2022/11/03/analyse-et-poc-de-la-cve-2022-33679/

#Windows

CVE-2022-33679

Proof of concept for CVE-2022-33679

https://github.com/Bdenneu/CVE-2022-33679

#Windows

More Impacket Examples

Additional examples for using Impacket

https://github.com/icyguider/MoreImpacketExamples

#Windows

MCP-PoC

Proof of concept for the MCP vulnerability

https://github.com/alfarom256/MCP-PoC

#Windows

RunasCs

Tool for executing processes as different users

https://github.com/antonioCoco/RunasCs

#Windows

Push Comes to Shove: Exploring the Attack Surface of SCCM Client Push Accounts

Exploring the attack surface of SCCM client push accounts

https://www.hub.trimarcsecurity.com/post/push-comes-to-shove-exploring-the-attack-surface-of-sccm-client-push-accounts

#Windows

Authentification Interprotocolaire sous Windows et Élévation de Privilèges

Authentification interprotocolaire sous Windows et élévation de privilèges

https://connect.ed-diamond.com/MISC/misc-090/authentification-interprotocolaire-sous-windows-et-elevation-de-privileges

#Windows

HTB - PivotAPI

HTB - PivotAPI

https://nuts7.github.io/htb-pivotapi/

#Windows

Playing with Relayed Credentials

Playing with relayed credentials

https://web.archive.org/web/20220518143031/https://www.secureauth.com/blog/playing-with-relayed-credentials/

#Windows

Brute Force Attack Against NTLMv2 Response

Brute force attack against NTLMv2 response

https://msmania.github.io/2016/09/19/brute-force-attack-against-ntlmv2-response.html

#Windows

We Love Relaying Credentials: A Technical Guide to Relaying Credentials Everywhere

We love relaying credentials: A technical guide to relaying credentials everywhere

https://www.secureauth.com/blog/we-love-relaying-credentials-a-technical-guide-to-relaying-credentials-everywhere

#Windows

The Adventures of JFronske

The adventures of JFronske

https://www.secureauth.com/author/jfronske/

#Windows

From RPCView to PetitPotam

From RPCView to PetitPotam

https://itm4n.github.io/from-rpcview-to-petitpotam/

#Windows

Credential Guard Bypass

Credential Guard bypass

https://itm4n.github.io/credential-guard-bypass/

#Windows

Active Directory NTLM Attack Security Advisory

Active Directory NTLM attack security advisory

https://www.crowdstrike.com/blog/active-directory-ntlm-attack-security-advisory/

#Windows

LdapRelayScan

LdapRelayScan

https://github.com/zyn3rgy/LdapRelayScan

#Windows

CredMaster

CredMaster

https://github.com/knavesec/CredMaster

#Windows

Get-bADpasswords

Get-bADpasswords

https://github.com/improsec/Get-bADpasswords

#Windows

Masky

Masky

https://github.com/Z4kSec/Masky

#Windows

Podcast Episode on Spotify

Podcast episode on Spotify

https://open.spotify.com/episode/0fC7SmcbzX5yPna1v09Rwj

#Windows

LDAP Shell

LDAP Shell

https://github.com/PShlyundin/ldap_shell

#Windows

A Bit About Kerberos

A bit about Kerberos

https://syfuhs.net/a-bit-about-kerberos

#Windows

Technical Analysis of CVE-2022-33679 and CVE-2022-33647 Kerberos Vulnerabilities

Technical analysis of CVE-2022-33679 and CVE-2022-33647 Kerberos vulnerabilities

https://securityboulevard.com/2022/10/technical-analysis-of-cve-2022-33679-and-cve-2022-33647-kerberos-vulnerabilities/amp/

#Windows

CallbackHell - GitHub Repository

GitHub repository for CallbackHell

https://github.com/ly4k/CallbackHell

#Windows

Windows Print Spooler Service: A Turbulent History

Article discussing the turbulent history of the Windows Print Spooler service

https://podalirius.net/fr/articles/windows-print-spooler-service-a-turbulent-history/

#Windows

From Stolen Laptop to Inside the Company Network

Blog post detailing the journey from a stolen laptop to accessing the company network

https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network

#Windows

Orpheus - TrustedSec GitHub Repository

GitHub repository for Orpheus by TrustedSec

https://github.com/trustedsec/orpheus

#Windows

DetectionLab - GitHub Repository

GitHub repository for DetectionLab

https://github.com/clong/DetectionLab

#Windows

Almost All the Ways to File Transfer

Article covering almost all methods of file transfer

https://medium.com/@PenTest_duck/almost-all-the-ways-to-file-transfer-1bd6bf710d65

#Windows

Relaying to AD Certificate Services Over RPC

Blog post on relaying to AD Certificate Services over RPC

https://blog.compass-security.com/2022/11/relaying-to-ad-certificate-services-over-rpc/

#Windows

Certipy - GitHub Repository

GitHub repository for Certipy

https://github.com/sploutchy/Certipy

#Windows

A Dive into Microsoft Defender for Identity

Publication diving into Microsoft Defender for Identity

https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html

#Windows

NoFix LPE Using KrbRelay with Shadow Credentials

Article on NoFix LPE using KrbRelay with Shadow Credentials

https://icyguider.github.io/2022/05/19/NoFix-LPE-Using-KrbRelay-With-Shadow-Credentials.html

#Windows

Exchange Penetration Testing

GitHub repository for Exchange penetration testing

https://github.com/kh4sh3i/exchange-penetration-testing

#Windows

MS Exchange Updates

Website for Microsoft Exchange updates

https://www.msexchangeupdates.com/

#Windows

Spartacus - Accenture GitHub Repository

GitHub repository for Spartacus by Accenture

https://github.com/Accenture/Spartacus

#Windows

WSUS Spoofing

Article on WSUS spoofing for movement and coerced authentications

https://www.thehacker.recipes/ad/movement/mitm-and-coerced-authentications/wsus-spoofing

#Windows

CertPotato: Using ADCS to PrivEsc from Virtual and Network Service Accounts to Local System

Blog post on CertPotato: using ADCS to privilege escalate from virtual and network service accounts to local system

https://sensepost.com/blog/2022/certpotato-using-adcs-to-privesc-from-virtual-and-network-service-accounts-to-local-system

#Windows

SysmonEoP - GitHub Repository

GitHub repository for SysmonEoP

https://github.com/Wh04m1001/SysmonEoP

#Windows

SharpEfsPotato - GitHub Repository

GitHub repository for SharpEfsPotato

https://github.com/bugch3ck/SharpEfsPotato

#Windows

SilentMoonwalk - GitHub Repository

GitHub repository for SilentMoonwalk

https://github.com/klezVirus/SilentMoonwalk

#Windows

Revisiting Delegate 2 Thyself

Article revisiting Delegate 2 Thyself

https://exploit.ph/revisiting-delegate-2-thyself.html

#Windows

Shadow Credentials

Blog post on shadow credentials

https://shenaniganslabs.io/2021/06/21/Shadow-Credentials.html

#Windows

Let's Talk About Kerberos

Blog post titled "Let's Talk About Kerberos"

https://johndcyber.com/lets-talk-about-kerberos-6376d0bd7d91

#Windows

Diamond And Sapphire Tickets

Blog post titled "Diamond And Sapphire Tickets"

https://pgj11.com/posts/Diamond-And-Sapphire-Tickets/

#Windows

ASREPRoasting: Deep Dive

Article diving deep into ASREPRoasting

https://ristbs.notion.site/ASREPRoasting-Deep-Dive-b2bca7b747474053b23669f26e114157

#Windows

Windows Protocols in Python

Blog post on Windows protocols in Python

https://www.hackthebox.com/blog/windows-protocols-python

#Windows

Mayfly277

Mayfly277

https://mayfly277.github.io/

#Windows

A Dive into Microsoft Defender for Identity

Publication diving into Microsoft Defender for Identity

https://www.synacktiv.com/en/publications/a-dive-into-microsoft-defender-for-identity.html

#Windows

Twitter - @_nwodtuhs

Twitter post by @_nwodtuhs

https://twitter.com/_nwodtuhs/status/1604900697685704704

#Windows

Assessing SMSA

Article assessing SMSA

https://simondotsh.com/infosec/2022/12/12/assessing-smsa.html

#Windows

JAWS - GitHub Repository

GitHub repository for JAWS

https://github.com/411Hall/JAWS

#Windows

No Shells Required: Using Impacket to...

Article titled "No Shells Required: Using Impacket to..."

http://blog.redxorblue.com/2019/12/no-shells-required-using-impacket-to.html

#Windows

Windows Active Directory Exploitation Cheat Sheet and Command Reference

Article on Windows Active Directory exploitation cheat sheet and command reference

https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/

#Windows

ADSecurity Blog Post

ADSecurity blog post

https://adsecurity.org/?p=113

#Windows

Free Micropatches for PetitPotam

Blog post on free micropatches for PetitPotam

https://blog.0patch.com/2021/08/free-micropatches-for-petitpotam.html?m=1

#Windows

Serioussam AKA Hivenightmare Vulnerability: Local Privilege Escalation on Windows 10

Article on Serioussam AKA Hivenightmare vulnerability for local privilege escalation on Windows 10

https://medium.com/attivotechblogs/serioussam-aka-hivenightmare-vulnerability-local-privilege-escalation-on-windows-10-2289fb81c933

#Windows

Hivenightmare Zero Day Lets Anyone Be System on Windows 10 and 11

Article on Hivenightmare zero day allowing anyone to be system on Windows 10 and 11

https://www.malwarebytes.com/blog/news/2021/07/hivenightmare-zero-day-lets-anyone-be-system-on-windows-10-and-11

#Windows

MSRPC to ATT&CK - GitHub Repository

GitHub repository for MSRPC to ATT&CK

https://github.com/jsecurity101/MSRPC-to-ATTACK

#Windows

Windows Coerced Authentication Methods - GitHub Repository

GitHub repository for Windows coerced authentication methods

https://github.com/p0dalirius/windows-coerced-authentication-methods

#Windows

Digging into PsExec with HTB Nest

Article on digging into PsExec with HTB Nest

https://0xdf.gitlab.io/2020/01/26/digging-into-psexec-with-htb-nest.html

#Windows

Pass the Challenge: Defeating Windows Defender Credential Guard

Article on passing the challenge to defeat Windows Defender Credential Guard

https://research.ifcr.dk/pass-the-challenge-defeating-windows-defender-credential-guard-31a892eee22

#Windows

NTLM Scanner - GitHub Repository

GitHub repository for NTLM Scanner

https://github.com/preempt/ntlm-scanner

#Windows

GPO2SQL - GitHub Repository

GitHub repository for GPO2SQL

https://github.com/aurel26/gpo2sql

#Windows

FreeIPA: Attacking the Active Directory of Linux

Slideshare on attacking the Active Directory of Linux using FreeIPA

https://www.slideshare.net/JulianCatrambone/freeipa-attacking-the-active-directory-of-linux

#Windows

TabShell OWASSRF

Blog post on TabShell OWASSRF

https://blog.viettelcybersecurity.com/tabshell-owassrf/

#Windows

CVE-2023-21752 - GitHub Repository

GitHub repository for CVE-2023-21752

https://github.com/Wh04m1001/CVE-2023-21752

#Windows

Offensive Windows IPC 2: RPC

Blog post on Offensive Windows IPC 2: RPC

https://csandker.io/2021/02/21/Offensive-Windows-IPC-2-RPC.html

#Windows

ZeroLogon: Attacking and Defending

Blog post on ZeroLogon: attacking and defending

https://blog.zsec.uk/zerologon-attacking-defending/

#Windows

Zeroing in on ZeroLogon: Crypto More Than Zeros

Article on zeroing in on ZeroLogon: crypto more than zeros

https://medium.com/@TalBeerySec/zeroing-in-on-zerologon-crypto-more-than-zeros-5d90fe5e4fd3

#Windows

Zerologon: Hacking Windows Servers with a Bunch of Zeros

Article on Zerologon: hacking Windows Servers with a bunch of zeros

https://nakedsecurity.sophos.com/2020/09/17/zerologon-hacking-windows-servers-with-a-bunch-of-zeros/

#Windows

Blog - Keramas

Blog post on Keramas

https://keramas.github.io/blog.html

#Windows

Filip Dragovic on Twitter

Twitter post by Filip Dragovic

https://twitter.com/filip_dragovic/status/1613565872844734465?s=20

#Windows

Domain Pentest Intro

Blog post titled "Domain Pentest Intro"

https://tyeyeah.github.io/2020/03/12/2020-03-12-Domain-Pentest-Intro/

#Windows

NTLMRawUnHide - GitHub Repository

GitHub repository for NTLMRawUnHide

https://github.com/mlgualtieri/NTLMRawUnHide

#Windows

GoSecretsDump - GitHub Repository

GitHub repository for GoSecretsDump

https://github.com/C-Sto/gosecretsdump

#Windows

Chaignc on Twitter

Twitter post by Chaignc

https://twitter.com/chaignc/status/1360512959596929024

#Windows

Priv2Admin - GitHub Repository

GitHub repository for Priv2Admin

https://github.com/gtworek/Priv2Admin

#Windows

Kerberoasting Without SPNs

Article on Kerberoasting without SPNs

https://swarm.ptsecurity.com/kerberoasting-without-spns/

#Windows

Priv Esc

Article on privilege escalation

https://amr-git-dot.github.io/offensive/Priv-esc/

#Windows

At the Edge of Tier Zero: The Curious Case of the RODC

Blog post on the curious case of the RODC

https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-the-rodc-ef5f1799ca06

#Windows

Phrack Issue 68

Article from Phrack Issue 68

http://phrack.org/issues/68/17.html

#Windows

Zerologon Deep Dive

Deep dive into Zerologon vulnerability

https://blog.diffense.co.kr/2020/10/06/Zerologon.html

#Windows

msFlagsDecoder - GitHub Repository

GitHub repository for msFlagsDecoder

https://github.com/p0dalirius/msFlagsDecoder

#Windows

Windows Remote Execution Techniques - Cheat Sheet

Cheat sheet on Windows remote execution techniques

https://cheatsheet.haax.fr/windows-systems/exploitation/remote_execution_techniques/

#Windows

PsExec - Sysinternals

Microsoft Sysinternals PsExec tool documentation

https://learn.microsoft.com/fr-fr/sysinternals/downloads/psexec

#Windows

hashgrab - GitHub Repository

GitHub repository for hashgrab

https://github.com/xct/hashgrab

#Windows

cme-wmi - GitHub Repository

GitHub repository for cme-wmi

https://github.com/Orange-Cyberdefense/cme-wmi

#Windows

Microsoft Teams Premium Cuts Costs and AI-Powered Productivity

Microsoft Teams premium features blog post

https://www.microsoft.com/en-us/microsoft-365/blog/2023/02/01/microsoft-teams-premium-cut-costs-and-add-ai-powered-productivity/

#Windows

Bad-Pdf - GitHub Repository

GitHub repository for Bad-Pdf

https://github.com/deepzec/Bad-Pdf

#Windows

Internal Information Disclosure Using Hidden NTLM Authentication

Article on internal information disclosure using hidden NTLM authentication

https://medium.com/swlh/internal-information-disclosure-using-hidden-ntlm-authentication-18de17675666

#Windows

Capturing and Relaying Net NTLM Hashes without Kali Linux using Inveigh

Article on capturing and relaying Net NTLM hashes without Kali Linux using Inveigh

https://infinitelogins.com/2020/11/16/capturing-relaying-net-ntlm-hashes-without-kali-linux-using-inveigh/

#Windows

Infinite Logins Author Page

Author page for Infinite Logins

https://infinitelogins.com/author/1nfinitelogins/

#Windows

Run as System Using Evil-WinRM

Blog post on running as system using Evil-WinRM

https://malicious.link/post/2020/run-as-system-using-evil-winrm/

#Windows

Microsoft Teams Premium Cuts Costs and AI-Powered Productivity

Microsoft Teams premium features blog post

https://www.microsoft.com/en-us/microsoft-365/blog/2023/02/01/microsoft-teams-premium-cut-costs-and-add-ai-powered-productivity/

#Windows

BackupOperatorToDA - GitHub Repository

GitHub repository for BackupOperatorToDA

https://github.com/mpgn/BackupOperatorToDA

#Windows

bhyve - GitHub Repository

GitHub repository for bhyve

https://github.com/synacktiv/bhyve

#Windows

Revisiting Unconstrained Delegation

Article revisiting unconstrained delegation

https://m365internals.com/2021/10/27/revisiting-unconstrained-delegation/

#Windows

Paper on Security Vulnerability 962

Paper on security vulnerability 962

https://paper.seebug.org/962/

#Windows

JAWS - GitHub Repository

GitHub repository for JAWS

https://github.com/411Hall/JAWS

#Windows

Metasploit Framework 6.3 Released

Blog post on Metasploit Framework 6.3 release

https://www.rapid7.com/blog/post/2023/01/30/metasploit-framework-6-3-released/

#Windows

Potatoes Windows Privilege Escalation

Blog post on Potatoes Windows privilege escalation

https://jlajara.gitlab.io/Potatoes_Windows_Privesc

#Windows

Pluralsight Windows Internals

Pluralsight course on Windows internals

https://p30download.ir/fa/entry/70419/pluralsight-windows-internals

#Windows

Relaying to ADFS Attacks

Blog post on relaying to ADFS attacks

https://www.praetorian.com/blog/relaying-to-adfs-attacks/

#Windows

ldappersistence - GitHub Repository

GitHub repository for ldappersistence

https://github.com/leonardoml97/ldappersistence

#Windows

LocalPotato - LocalPotato Website

LocalPotato website for local privilege escalation

https://www.localpotato.com/localpotato_html/LocalPotato.html

#Windows

UnmanagedPowerShell - GitHub Repository

GitHub repository for UnmanagedPowerShell

https://github.com/mmnoureldin/UnmanagedPowerShell

#Windows

Red-Teamer - GitHub Repository

GitHub repository for Red-Teamer

https://github.com/Christbowel/Red-Teamer

#Windows

RedTeam Tools - GitHub Repository

GitHub repository for RedTeam Tools

https://github.com/A-poc/RedTeam-Tools

#Windows

SharpSystemTriggers - GitHub Repository

GitHub repository for SharpSystemTriggers

https://github.com/cube0x0/SharpSystemTriggers/

#Windows

TrustedInstallerPOC - GitHub Repository

GitHub repository for TrustedInstallerPOC

https://github.com/FourCoreLabs/TrustedInstallerPOC

#Windows

Malware AV Evasion Techniques

Article on malware AV evasion techniques

https://cocomelonc.github.io/malware/2023/02/20/malware-av-evasion-12.html

#Windows

RODC - Read-Only Domain Controller

Article on Read-Only Domain Controllers (RODC)

https://www.it-connect.fr/rodc-controleur-de-domaine-en-lecture-seule/

#Windows

The Kerberos Key List Attack and Read-Only Domain Controllers

Blog post on the Kerberos Key List Attack and Read-Only Domain Controllers

https://www.secureauth.com/blog/the-kerberos-key-list-attack-the-return-of-the-read-only-domain-controllers/

#Windows

powerview.py - GitHub Repository

GitHub repository for powerview.py

https://github.com/aniqfakhrul/powerview.py

#Windows

Sacrificial Session

Blog post on sacrificial session

https://unshade.tech/sacrificial-session

#Windows

Churrasco - GitHub Repository

GitHub repository for Churrasco

https://github.com/Re4son/Churrasco/

#Windows

SharpCollection - GitHub Repository

GitHub repository for SharpCollection

https://github.com/Flangvik/SharpCollection/tree/master/NetFramework_4.0_Any

#Windows

SRP Protecting Windows Folder in Win 10

Article on SRP protecting Windows folder in Windows 10

https://malwaretips.com/threads/srp-protecting-windows-folder-in-win-10.80283/

#Windows

scmanager - GitHub Repository

GitHub repository for scmanager

https://0xv1n.github.io/posts/scmanager/

#Windows

Gabriel Landau Twitter Post

Twitter post by Gabriel Landau

https://twitter.com/gabriellandau/status/1630663187379920902?s=46&t=XuwW89LGgXMjCMS9Xs-yTw

#Windows

Kerberos Delegation, SPNs, and More

Blog post on Kerberos delegation, SPNs, and more

https://www.secureauth.com/blog/kerberos-delegation-spns-and-more/

#Windows

Windows LPE AFD CVE-2023-21768 - GitHub Repository

GitHub repository for Windows LPE AFD CVE-2023-21768

https://github.com/xforcered/Windows_LPE_AFD_CVE-2023-21768

#Windows

50 Methods for Dumping LSASS

Article on 50 methods for dumping LSASS

https://redteamrecipe.com/50-Methods-For-Dump-LSASS/

#Windows

Seized CA CTF 2022 Forensics Writeup

Blog post on Seized CA CTF 2022 forensics writeup

https://www.hackthebox.com/blog/seized-ca-ctf-2022-forensics-writeup

#Windows

ldapper - GitHub Repository

GitHub repository for ldapper

https://github.com/Synzack/ldapper

#Windows

Exploiting CVE-2023-23397 Microsoft Outlook Elevation of Privilege Vulnerability

Blog post on exploiting CVE-2023-23397 Microsoft Outlook Elevation of Privilege Vulnerability

https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/

#Windows

CVE-2023-23397-POC-Powershell - GitHub Repository

GitHub repository for CVE-2023-23397-POC-Powershell

https://github.com/api0cradle/CVE-2023-23397-POC-Powershell

#Windows

InfinityHook - GitHub Repository

GitHub repository for InfinityHook

https://github.com/everdox/InfinityHook

#Windows

PPLmedic - GitHub Repository

GitHub repository for PPLmedic

https://github.com/itm4n/PPLmedic

#Windows

Breaking Trust Transitivity in AD Security Research

Blog post on breaking trust transitivity in AD security research

https://www.semperis.com/blog/ad-security-research-breaking-trust-transitivity/

#Windows

External Trusts are Evil

Article on external trusts being evil

https://exploit.ph/external-trusts-are-evil.html

#Windows

Protected Users: You Thought You Were Safe, Uh?

Blog post on Protected Users in Active Directory

https://sensepost.com/blog/2023/protected-users-you-thought-you-were-safe-uh/

#Windows

GoMapEnum - GitHub Repository

GitHub repository for GoMapEnum

https://github.com/nodauf/GoMapEnum

#Windows

LolDrivers - LOLDrivers Website

LOLDrivers website

https://www.loldrivers.io/

#Windows

CVE-2023-23397 Critical Microsoft Outlook Privilege Escalation Vulnerability

Blog post on CVE-2023-23397 critical Microsoft Outlook privilege escalation vulnerability

https://www.darkrelay.com/post/cve-2023-23397-critical-microsoft-outlook-privilege-escalation-vulnerability

#Windows

Debugging Protected Processes

Article on debugging protected processes

https://itm4n.github.io/debugging-protected-processes/

#Windows

PowerShdll - GitHub Repository

GitHub repository for PowerShdll

https://github.com/p3nt4/PowerShdll

#Windows

Gabriel Landau Twitter Post

Twitter post by Gabriel Landau

https://twitter.com/_xpn_/status/1648105737707462664?s=46&t=JxgY2AX1dUYukchnp53zJw

#Windows

Windows Secrets Extraction: A Summary

Article on Windows secrets extraction

https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary

#Windows

Proof of Concept for Critical Microsoft Word RCE Bug

Article on proof of concept for critical Microsoft Word RCE bug

https://www.bleepingcomputer.com/news/security/proof-of-concept-released-for-critical-microsoft-word-rce-bug/

#Windows

Introduction to Golden Certificates

Article on introduction to golden certificates

https://cyberstoph.org/posts/2019/12/an-introduction-to-golden-certificates/

#Windows

Delegate KRBTGT

Article on Delegate KRBTGT

https://skyblue.team/posts/delegate-krbtgt/

#Windows

Psexec: A Deep Look into Lateral Movement

Article on a deep look into Psexec and lateral movement

https://web.archive.org/web/20220309071610/https://www.contextis.com/en/blog/lateral-movement-a-deep-look-into-psexec

#Windows

LinkedIn Update by Segev Eliezer

LinkedIn update by Segev Eliezer

https://www.linkedin.com/feed/update/urn:li:activity:7059115384674635776

#Windows

ItWasAllADream - GitHub Repository

GitHub repository for ItWasAllADream

https://github.com/byt3bl33d3r/ItWasAllADream

#Windows

kuhl_m_misc.c - Mimikatz Module

Source code for kuhl_m_misc.c, a module in Mimikatz

https://github.com/gentilkiwi/mimikatz/blob/master/mimikatz/modules/kuhl_m_misc.c

#Windows

Windows Kernel Exploit List

GitHub repository listing Windows kernel exploits

https://github.com/njahrckstr/Windows_Kernel_Sploit_List

#Windows

Mimikatz LSAdumpLSA Patch and Inject

Deep dive on LSAdumpLSA patch and inject with Mimikatz

https://blog.3or.de/mimikatz-deep-dive-on-lsadumplsa-patch-and-inject.html

#Windows

ETWHash - GitHub Repository

GitHub repository for ETWHash

https://github.com/nettitude/ETWHash

#Windows

Exploring Impersonation with Named Pipe Filesystem Driver

Blog post on exploring impersonation through the named pipe filesystem driver

https://posts.specterops.io/exploring-impersonation-through-the-named-pipe-filesystem-driver-15f324dfbaf2

#Windows

Hunting with Active Directory Replication Metadata

Blog post on hunting with Active Directory replication metadata

https://posts.specterops.io/hunting-with-active-directory-replication-metadata-1dab2f681b19

#Windows

GodPotato - GitHub Repository

GitHub repository for GodPotato

https://github.com/BeichenDream/GodPotato

#Windows

RunAsPasswd - GitHub Repository

GitHub repository for RunAsPasswd

https://github.com/Sq00ky/RunAsPasswd

#Windows

Compromised! - Naacbin Blog Post

Blog post on compromised systems

https://naacbin.gitlab.io/compromised/

#Windows

CVE-2023-28231 RCE in Microsoft Windows DHCPv6 Service

Blog post on CVE-2023-28231 RCE in Microsoft Windows DHCPv6 Service

https://www.zerodayinitiative.com/blog/2023/5/1/cve-2023-28231-rce-in-the-microsoft-windows-dhcpv6-service

#Windows

CVE-2023-28231 - Glavstroy GitHub Repository

GitHub repository for CVE-2023-28231

https://github.com/glavstroy/CVE-2023-28231

#Windows

ADTimeline - GitHub Repository

GitHub repository for ADTimeline

https://github.com/ANSSI-FR/ADTimeline

#Windows

The Printer Goes Brrrrr Again

Blog post on printer security vulnerabilities

https://www.synacktiv.com/publications/the-printer-goes-brrrrr-again

#Windows

Advanced Threat Hunting with Active Directory Domain Services

Microsoft TechCommunity blog on advanced threat hunting

https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/advanced-threat-hunting-within-active-directory-domain-services/m-p/3820214

#Windows

Windows API Function Cheatsheets - GitHub Repository

GitHub repository for Windows API function cheatsheets

https://github.com/snowcra5h/windows-api-function-cheatsheets

#Windows

Domain Audit - GitHub Repository

GitHub repository for Domain Audit

https://github.com/0xJs/domain_audit

#Windows

Anquanke Post on Security

Article on security from Anquanke

https://www.anquanke.com/post/id/266883

#Windows

S4fuckMe2selfAndUAndU2proxy - LueMmelSec Blog

Blog post on S4fuckMe2selfAndUAndU2proxy Kerberos delegations

https://luemmelsec.github.io/S4fuckMe2selfAndUAndU2proxy-A-low-dive-into-Kerberos-delegations/

#Windows

CVE-2023-21554 - ZoeMurmure Post

Blog post on CVE-2023-21554

https://www.zoemurmure.top/posts/cve_2023_21554/

#Windows

RPCView - GitHub Repository

GitHub repository for RPCView

https://www.rpcview.org/

#Windows

Pass-the-Hash is Dead, Long Live LocalAccountTokenFilterPolicy

Blog post on Pass-the-Hash mitigation

https://posts.specterops.io/pass-the-hash-is-dead-long-live-localaccounttokenfilterpolicy-506c25a7c167

#Windows

MiniKerberos - GitHub Repository

GitHub repository for MiniKerberos

https://github.com/skelsec/minikerberos/

#Windows

Windows Version Comparison

Windows version comparison tool

https://files.rg-adguard.net/version/f0bd8307-d897-ef77-dbd6-216fefbe94c5

#Windows

Hidden Desktop - GitHub Repository

GitHub repository for Hidden Desktop

https://github.com/WKL-Sec/HiddenDesktop

#Windows

WinDiff - GitHub Repository

GitHub repository for WinDiff

https://github.com/ergrelet/windiff

#Windows

Directory Deletion Shell - Secret Club Blog

Blog post on directory deletion shell

https://secret.club/2020/04/23/directory-deletion-shell.html

#Windows

NTCore - Process and Application Security

Website on process and application security by NTCore

https://ntcore.com/?page_id=388

#Windows

NTCore - Author Page

Author page on NTCore

https://ntcore.com/?author=2

#Windows

Golden GMSA Attack

Blog post on Golden GMSA attack

https://www.semperis.com/blog/golden-gmsa-attack/

#Windows

Yuval Gorden - Author Page

Author page for Yuval Gorden on Semperis blog

https://www.semperis.com/author/yuvalgorden/

#Windows

Linikatz - GitHub Repository

GitHub repository for Linikatz by CiscoCXSecurity

https://github.com/CiscoCXSecurity/linikatz

#Windows

Hacking Windows - LinkedIn Post

LinkedIn post on hacking Windows

https://www.linkedin.com/posts/brcyrr_hacking-windows-ugcPost-7080094555986927616-7TrP

#Windows

Internals - ScorpioSoftware Tag

Blog posts tagged with Internals on ScorpioSoftware

https://scorpiosoftware.net/tag/internals/

#Windows

Modexp - Windows Security Blog

Windows security blog by Modexp

https://modexp.wordpress.com/

#Windows

Autochk Rootkit Analysis - Repnz Blog

Blog post on autochk rootkit analysis

https://repnz.github.io/posts/autochk-rootkit-analysis/

#Windows

RdpThief - GitHub Repository

GitHub repository for RdpThief

https://github.com/0x09AL/RdpThief

#Windows

Shellcodes Are Dead, Long Live Fileless Shellcodes

Blog post on fileless shellcodes

https://kleiton0x00.github.io/posts/Shellcodes-are-dead-long-live-fileless-shellcodes/

#Windows

MagicSigner - GitHub Repository

GitHub repository for MagicSigner

https://github.com/namazso/MagicSigner

#Windows

Ghidra Threatcheck - Offensive Defence

Blog post on Ghidra threatcheck tool

https://offensivedefence.co.uk/posts/threatcheck-ghidra/

#Windows

Detecting Syscalls with Fennec

Blog post on detecting syscalls with Fennec

https://web.archive.org/web/20230304082027/https://mez0.cc/posts/detecting-syscalls-with-fennec/

#Windows

Lord of the Ring0 - idov31 Blog

Blog post on Lord of the Ring0

https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html

#Windows

CloudEye - Gi7w0rm Medium Post

Blog post on CloudEye from LNK to shellcode

https://gi7w0rm.medium.com/cloudeye-from-lnk-to-shellcode-4b5f1d6d877

#Windows

DdiMon - GitHub Repository

GitHub repository for DdiMon

https://github.com/tandasat/DdiMon

#Windows

DivideConqer - BadOption Blog

Blog post on divide and conquer technique

https://badoption.eu/blog/2023/07/15/divideconqer.html

#Windows

Windows Privilege Escalation Malware Technique

Article on Windows privilege escalation malware technique

https://medium.com/@s12deff/windows-privilege-escalation-malware-technique-714e0fe256ab

#Windows

Process Killer Driver - Alice Climent-Pommeret Blog

Blog post on process killer driver

https://alice.climent-pommeret.red/posts/process-killer-driver/

#Windows

Tracking WSL Activity with API Hooking

Blog post on tracking WSL activity with API hooking

https://www.hackthebox.com/blog/tracking-wsl-activity-with-api-hooking

#Windows

Autobloody - GitHub Repository

GitHub repository for Autobloody

https://github.com/CravateRouge/autobloody

#Windows

Hunting Process Injection by Windows API Activity

LinkedIn post on hunting process injection

https://www.linkedin.com/posts/husamshbib_hunting-process-injection-by-windows-api-activity-7091689113694683136-8Gby

#Windows

KrbJack - GitHub Repository

GitHub repository for KrbJack

https://github.com/almandin/krbjack

#Windows

NTDS to SQLite - GitHub Repository

GitHub repository for NTDS to SQLite

https://github.com/almandin/ntdsdotsqlite

#Windows

RoastInTheMiddle - GitHub Repository

GitHub repository for RoastInTheMiddle

https://github.com/0xe7/RoastInTheMiddle

#Windows

Abusing KCD without Protocol Transition - Snovvcrash Blog

Blog post on abusing KCD without protocol transition

https://snovvcrash.rocks/2022/03/06/abusing-kcd-without-protocol-transition.html

#Windows

LAPSV2 Internals - SensePost Blog

Blog post on LAPSV2 internals

https://blog.xpnsec.com/lapsv2-internals/

#Windows

Bypassing UAC with SSPI Datagram - SplinterCod3 Blog

Blog post on bypassing UAC with SSPI datagram

https://splintercod3.blogspot.com/p/bypassing-uac-with-sspi-datagram.html?m=1

#Windows

Windows Research Kernel (WRK) - GitHub Repository

GitHub repository for Windows Research Kernel (WRK)

https://github.com/HighSchoolSoftwareClub/Windows-Research-Kernel-WRK-

#Windows

Windows Kernel Address Leaks - Sam-B GitHub Repository

GitHub repository for Windows kernel address leaks

https://github.com/sam-b/windows_kernel_address_leaks

#Windows

WarbirdVM - Airbus SecLab GitHub Repository

GitHub repository for WarbirdVM by Airbus SecLab

https://github.com/airbus-seclab/warbirdvm

#Windows

Windows Warbird Privilege Escalation - XPNSEC Blog

Blog post on Windows Warbird privilege escalation

https://blog.xpnsec.com/windows-warbird-privesc/

#Windows

MSSqlPwner - ScorpionesLabs GitHub Repository

GitHub repository for MSSqlPwner by ScorpionesLabs

https://github.com/ScorpionesLabs/MSSqlPwner

#Windows

Threats to Edge Computing

Thesis on threats to edge computing

https://www.theseus.fi/handle/10024/806660

#Windows

DPAPI In-Depth with Tooling - Insecurity Blog

Blog post on DPAPI in-depth with tooling

https://www.insecurity.be/blog/2020/12/24/dpapi-in-depth-with-tooling-standalone-dpapi/

#Windows

Tijl - Author Page

Author page for Tijl on Insecurity blog

https://www.insecurity.be/blog/author/tijl/

#Windows

Abusing Forgotten Permissions in Active Directory

Blog post on abusing forgotten permissions in Active Directory

https://dirkjanm.io/abusing-forgotten-permissions-on-precreated-computer-objects-in-active-directory/

#Windows

Relaying Potatoes - SentinelOne Labs Blog

Blog post on relaying potatoes in Windows RPC protocol

https://www.sentinelone.com/labs/relaying-potatoes-another-unexpected-privilege-escalation-vulnerability-in-windows-rpc-protocol/

#Windows

Windows Exploitation Tricks - Google Project Zero Blog

Blog post on Windows exploitation tricks by Google Project Zero

https://googleprojectzero.blogspot.com/2021/10/windows-exploitation-tricks-relaying.html

#Windows

Protected Users: You Thought You Were Safe, Uh?

Blog post on Protected Users in Active Directory

https://sensepost.com/blog/2023/protected-users-you-thought-you-were-safe-uh/

#Windows

Relaying NTLM Authentication over RPC - Compass Security Blog

Blog post on relaying NTLM authentication over RPC

https://blog.compass-security.com/2020/05/relaying-ntlm-authentication-over-rpc/

#Windows

Sheinige - Author Page

Author page for Sheinige on Compass Security blog

https://blog.compass-security.com/author/sheinige/

#Windows

Awesome Potatoes - GitHub Repository

GitHub repository for Awesome Potatoes

https://github.com/bodik/awesome-potatoes

#Windows

Kerberos 102 Overview - Chudamax Blog

Blog post on Kerberos 102 overview

https://www.chudamax.com/posts/kerberos-102-overview/

#Windows

LOLDrivers - LOLDrivers Website

LOLDrivers website

https://www.loldrivers.io/

#Windows

Allocated Altitudes in Windows Drivers

Documentation on allocated altitudes in Windows drivers

https://github.com/MicrosoftDocs/windows-driver-docs/blob/b76d581d853c8da61fe0604a44e68ab16deca785/windows-driver-docs-pr/ifs/allocated-altitudes.md

#Windows

Windows Components Object Model - 221bluestreet Blog

Blog post on Windows Components Object Model

https://www.221bluestreet.com/offensive-security/windows-components-object-model

#Windows

Directory Ranger Twitter Post

Twitter post by Directory Ranger

https://twitter.com/directoryranger/status/1705505689957794146?s=46&t=XuwW89LGgXMjCMS9Xs-yTw

#Windows

Directory Ranger - Twitter Profile

Twitter profile for Directory Ranger

https://twitter.com/DirectoryRanger

#Windows

SCCM Hierarchy Takeover - SpecterOps Blog

Blog post on SCCM hierarchy takeover

https://posts.specterops.io/sccm-hierarchy-takeover-41929c61e087

#Windows

WinRS Command - Microsoft Docs

Microsoft Docs page on WinRS command

https://learn.microsoft.com/fr-fr/windows-server/administration/windows-commands/winrs

#Windows

MalDev for Dummies - GitHub Repository

GitHub repository for MalDev for Dummies

https://github.com/chvancooten/maldev-for-dummies/

#Windows

Syncing into the Shadows - JSecurity101 Medium Post

Blog post on syncing into the shadows

https://jsecurity101.medium.com/syncing-into-the-shadows-bbd656dd14c8

#Windows

DCShadow - NoLimitSecu Blog

Blog post on DCShadow

https://www.nolimitsecu.fr/dcshadow/

#Windows

S4UTomato - GitHub Repository

GitHub repository for S4UTomato

https://github.com/wh0amitz/S4UTomato

#Windows

C24cfd1bd141d14d4925043ee7e03c82 - GitHub Gist

GitHub Gist for c24cfd1bd141d14d4925043ee7e03c82

https://gist.github.com/tyranid/c24cfd1bd141d14d4925043ee7e03c82

#Windows

The Evolution of Windows Authentication - Microsoft TechCommunity Blog

Blog post on the evolution of Windows authentication

https://techcommunity.microsoft.com/t5/windows-it-pro-blog/the-evolution-of-windows-authentication/ba-p/3926848

#Windows

Fuzzing Windows RPC with RPCView

Blog post on fuzzing Windows RPC with RPCView

https://itm4n.github.io/fuzzing-windows-rpc-rpcview/

#Windows

RPCForge - GitHub Repository

GitHub repository for RPCForge

https://github.com/sogeti-esec-lab/RPCForge

#Windows

Akamai RPC Toolkit - GitHub Repository

GitHub repository for Akamai RPC Toolkit

https://github.com/akamai/akamai-security-research/tree/main/rpc_toolkit

#Windows

Analysing RPC with Ghidra and Neo4j

Blog post on analysing RPC with Ghidra and Neo4j

https://blog.xpnsec.com/analysing-rpc-with-ghidra-neo4j/

#Windows

InterProcessCommunication-Samples - GitHub Repository

GitHub repository for InterProcessCommunication-Samples

https://github.com/csandker/InterProcessCommunication-Samples

#Windows

Ariadne - GitHub Repository

GitHub repository for Ariadne

https://github.com/seeinglogic/ariadne

#Windows

Photos from OffSec 2023 Event

Photos from OffSec 2023 event

https://photos.app.goo.gl/R1tcPhNCGpag4bxp9

#Windows

Building an Offensive RPC Interface - SensePost Blog

Blog post on building an offensive RPC interface

https://sensepost.com/blog/2021/building-an-offensive-rpc-interface/

#Windows

CertSync - GitHub Repository

GitHub repository for CertSync

https://github.com/zblurx/certsync

#Windows

RogueWinRM - GitHub Repository

GitHub repository for RogueWinRM

https://github.com/antonioCoco/RogueWinRM

#Windows

ContainYourself - GitHub Repository

GitHub repository for ContainYourself by Deep Instinct

https://github.com/deepinstinct/ContainYourself

#Windows

Reversing Windows Container Episode I: Silo - Quarkslab Blog

Blog post on reversing Windows Container Episode I

https://blog.quarkslab.com/reversing-windows-container-episode-i-silo.html

#Windows

Playing in the Windows Sandbox

Exploration et recherche de Check Point dans le Windows Sandbox

https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/

#Windows

Alexil - Check Point Research

Page d'auteur d'Alexil sur Check Point Research

https://research.checkpoint.com/author/alexil/

#Windows

LinikatzV2 - GitHub Repository

GitHub repository pour LinikatzV2 par Orange-Cyberdefense

https://github.com/Orange-Cyberdefense/LinikatzV2

#Windows

Microsoft Office 2023

Exploration des vulnérabilités de Microsoft Office 2023

https://blog.pksecurity.io/2023/10/04/microsoft-office.html

#Windows

10 Years of Windows Privilege Escalation with Potatoes

Présentation sur 10 ans d'escalade de privilèges Windows avec Potatoes par AntonioCoco

https://github.com/antonioCoco/infosec-talks/blob/main/10_years_of_Windows_Privilege_Escalation_with_Potatoes.pdf

#Windows

Fantastic Windows Logon Types and Where to Find Credentials in Them

Guide sur les types de connexion Windows et la recherche de credentials

https://www.alteredsecurity.com/post/fantastic-windows-logon-types-and-where-to-find-credentials-in-them

#Windows

Windows APT Warfare: Identify and Prevent Attacks Effectively

Stratégies pour identifier et prévenir efficacement les attaques APT sur Windows

https://grootfreelearning.com/windows-apt-warfare-identify-and-prevent-attacks-effectively/

#Windows

Abdullahzk777gmail-com - Groot Free Learning

Page d'auteur d'Abdullahzk777gmail-com sur Groot Free Learning

https://grootfreelearning.com/author/abdullahzk777gmail-com/

#Windows

Windows Drive Remapping EoP - GitHub Repository

GitHub repository pour Windows Drive Remapping EoP par Blue Frost Security

https://github.com/bluefrostsecurity/Windows-Drive-Remapping-EoP

#Windows

Modexp Blog

Blog de Modexp

https://modexp.wordpress.com/

#Windows

From NTAuthCertificates to Silver Certificate

Exploration de Decoder Cloud sur NTAuthCertificates à Silver Certificate

https://decoder.cloud/2023/09/05/from-ntauthcertificates-to-silver-certificate/

#Windows

Decoderblogblog - Decoder Cloud

Page d'auteur de Decoderblogblog sur Decoder Cloud

https://decoder.cloud/author/decoderblogblog/

#Windows

macOS Red Teaming: Get AD Credentials from Nomad

Techniques de red teaming macOS pour obtenir des identifiants AD depuis Nomad

https://wojciechregula.blog/post/macos-red-teaming-get-ad-credentials-from-nomad/

#Windows

EvilRDP - GitHub Repository

GitHub repository pour EvilRDP par Skelsec

https://github.com/skelsec/evilrdp

#Windows

AD CS: New Ways to Abuse ManageCA Permissions

Nouvelles façons d'abuser des permissions ManageCA dans AD CS

https://whoamianony.top/posts/ad-cs-new-ways-to-abuse-manageca-permissions/

#Windows

ADCSKiller - GitHub Repository

GitHub repository pour ADCSKiller par Grimlockx

https://github.com/grimlockx/ADCSKiller

#Windows

Obfuscation thru Polymorphism and Instantiation

Techniques d'obfuscation à travers le polymorphisme et l'instanciation

https://mark.rxmsolutions.com/obfuscation-thru-polymorphism-and-instantiation/

#Windows

PySQLRecon - GitHub Repository

GitHub repository pour PySQLRecon par Tw1sm

https://github.com/Tw1sm/PySQLRecon

#Windows

Kerberos.NET - GitHub Repository

GitHub repository pour Kerberos.NET par dotnet

https://github.com/dotnet/Kerberos.NET

#Windows

SCCMHunter - GitHub Repository

GitHub repository pour SCCMHunter par GarrettFoster13

https://github.com/garrettfoster13/sccmhunter

#Windows

Directory Deletion Shell

Shell de suppression de répertoire

https://secret.club/2020/04/23/directory-deletion-shell.html

#Windows

I Wanna Go Fast: Really Fast Like Kerberos Fast

Optimisation des performances Kerberos

https://trustedsec.com/blog/i-wanna-go-fast-really-fast-like-kerberos-fast

#Windows

Marvel Lab - GitHub Repository

GitHub repository pour Marvel Lab par jsecurity101

https://github.com/jsecurity101/Marvel-Lab

#Windows

Bitwarden Heist

Heist de Bitwarden

https://blog.redteam-pentesting.de/2024/bitwarden-heist/

#Windows

SignToolEx - GitHub Repository

GitHub repository pour SignToolEx par Hackerhouse OpenSource

https://github.com/hackerhouse-opensource/SignToolEx

#Windows

Moriarty - GitHub Repository

GitHub repository pour Moriarty par BC-SECURITY

https://github.com/BC-SECURITY/Moriarty

#Windows

Pentesting with Secure LDAP and LDAP Channel Binding

Pentesting avec LDAP sécurisé et le liage de canal LDAP

https://rootsecdev.medium.com/pentesting-with-secure-ldap-and-ldap-channel-binding-fd5baa0f7345

#Windows

Cypher Queries in BloodHound Enterprise

Requêtes Cypher dans BloodHound Enterprise

https://posts.specterops.io/cypher-queries-in-bloodhound-enterprise-c7221a0d4bb3

#Windows

SharpGhostTask - GitHub Repository

GitHub repository pour SharpGhostTask par dmcxblue

https://github.com/dmcxblue/SharpGhostTask

#Windows

CVE-2024-20656: Local Privilege Escalation in VSStandardCollectorService150 Service

Escalade de privilèges local dans le service VSStandardCollectorService150

https://www.mdsec.co.uk/2024/01/cve-2024-20656-local-privilege-escalation-in-vsstandardcollectorservice150-service/

#Windows

CVE-2024-20656 - GitHub Repository

GitHub repository pour CVE-2024-20656 par Wh04m1001

https://github.com/Wh04m1001/CVE-2024-20656

#Windows

Python SSPI Teaching Impacket to Respect Windows SSO

Enseigner à Impacket le respect du SSO Windows avec Python SSPI

https://swarm.ptsecurity.com/python-sspi-teaching-impacket-to-respect-windows-sso/

#Windows

BoFHound - GitHub Repository

GitHub repository pour BoFHound par Fortalice

https://github.com/fortalice/bofhound

#Windows

SOAPHound - GitHub Repository

GitHub repository pour SOAPHound par FalconForceTeam

https://github.com/FalconForceTeam/SOAPHound

#Windows

Trimarc Whitepaper: Owner or Pwnd

Document blanc Trimarc sur le propriétaire ou pwnd

https://www.hub.trimarcsecurity.com/post/trimarc-whitepaper-owner-or-pwnd

#Windows

AllTools - GitHub Repository

GitHub repository pour AllTools par Zodiacon

https://github.com/zodiacon/AllTools

#Windows

AutoHotkey - GitHub Repository

GitHub repository pour AutoHotkey

https://github.com/AutoHotkey/AutoHotkey

#Windows

Hello I'm Your ADCS Server and I Want to Authenticate Against You

Interaction d'autentification avec le serveur ADCS

https://decoder.cloud/2024/02/26/hello-im-your-adcs-server-and-i-want-to-authenticate-against-you/

#Windows

Cypher ADCS ESC14 Abuse Technique

Technique d'abus Cypher ADCS ESC14

https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9

#Windows

Parsing MSDN for Documented Technique Dev

Parsing MSDN pour la documentation des techniques de développement

https://signal-labs.com/parsing-msdn-for-documented-technique-dev/

#Windows

TOCTOU Vulnerabilities

Vulnérabilités TOCTOU

https://lucabarile.github.io/Blog/toctou/index.html

#Windows

OneMore STEAM EOP 0Day

OneMore STEAM EOP 0Day

https://amonitoring.ru/article/onemore_steam_eop_0day/

#Windows

LDAPNomNom - GitHub Repository

GitHub repository pour LDAPNomNom par LKarlslund

https://github.com/lkarlslund/ldapnomnom

#Windows

Pwned by the Mail Carrier

Pwned par le facteur

https://posts.specterops.io/pwned-by-the-mail-carrier-0750edfad43b

#Windows

PrintNightmare Exploitation

Exploitation de PrintNightmare

https://itm4n.github.io/printnightmare-exploitation/

#Windows

Misconfiguration Manager: Overlooked and Overprivileged

Gestionnaire de configuration incorrecte : négligé et surprivilegié

https://posts.specterops.io/misconfiguration-manager-overlooked-and-overprivileged-70983b8f350d

#Windows

Misconfiguration Manager - GitHub Repository

GitHub repository pour Misconfiguration Manager par Subat0mik

https://github.com/subat0mik/Misconfiguration-Manager/blob/main/attack-techniques/_attack-techniques-list.md

#Windows

Teams NTLM Leak - GitHub Repository

GitHub repository pour Teams NTLM Leak par Soufiane Tahiri

https://github.com/soufianetahiri/TeamsNTLMLeak/

#Windows

Nullinux - GitHub Repository

GitHub repository pour Nullinux par m8sec

https://github.com/m8sec/nullinux

#Windows

PatchGuardBypass - GitHub Repository

GitHub repository pour PatchGuardBypass par AdamOron

https://github.com/AdamOron/PatchGuardBypass

#Windows

LSA Whisperer

LSA Whisperer

https://posts.specterops.io/lsa-whisperer-20874277ea3b

#Windows

NETNTLMv1 Downgrade to Compromise

Régression vers NETNTLMv1 pour compromettre

https://www.r-tec.net/r-tec-blog-netntlmv1-downgrade-to-compromise.html

#Windows

AD CS Attack Paths in BloodHound Part 2

Chemins d'attaque AD CS dans BloodHound Part 2

https://posts.specterops.io/adcs-attack-paths-in-bloodhound-part-2-ac7f925d1547

#Windows

Kernel Special APC ReadProcessMemory - GitHub Repository

GitHub repository pour Kernel Special APC ReadProcessMemory par IcEy-999

https://github.com/IcEy-999/Kernel-Special-APC-ReadProcessMemory

#Windows

Hyper-V Internals - GitHub Repository

GitHub repository pour Hyper-V Internals par gerhart01

https://github.com/gerhart01/Hyper-V-Internals/tree/master

#Windows

BlackEnergy V.2 Full Driver Reverse Engineering

Ingénierie inverse complète du pilote BlackEnergy V.2

https://daniel25097.medium.com/blackenergy-v-2-full-driver-reverse-engineering-c9fd6d071946

#Windows

Understanding Windows Authenticode

Comprendre Windows Authenticode

https://reversea.me/index.php/authenticode-i-understanding-windows-authenticode/

#Windows

Understanding Windows Authenticode

Comprendre Windows Authenticode

https://reversea.me/index.php/author/duroz/

#Windows

Searchcode | source code search engine

searchcode is a free source code search engine. Code snippets and open source (free software) repositories are indexed and searchable.

https://searchcode.com/

#Osint

VMProtect Devirtualization

An experimental dynamic approach to devirtualize pure functions protected by VMProtect 3.x

https://github.com/JonathanSalwan/VMProtect-devirtualization

#Reverse

Deobfuscation of Semi-Linear Mixed Boolean-Arithmetic Expressions

Colton Skees Mazeworks Security [email protected]

https://arxiv.org/pdf/2406.10016

#Reverse

Windows Rootkits and Bootkits Guide

A Guide to the Arsenal of Windows Kernel Tricks Employed by Kernel-Mode Malware

https://artemonsecurity.com/rootkits_bootkits_v2.pdf

#Windows

NTFS Reference Sheet

NTFS Reference Sheet

https://www.writeblocked.org/resources/NTFS_CHEAT_SHEETS.pdf

#Forensics

MBR GPT cheatsheet

MBR GPT cheatsheet

https://www.writeblocked.org/resources/MBR_GPT_cheatsheet.pdf

#Forensics

Back Engineering Labs

Research-oriented team, specializing in Windows internals, obfuscation techniques, and product security. We make public contributions and are dedicated to driving progress in InfoSec.

https://github.com/backengineering

#Reverse

Back Engineering Blog

Research-oriented team, specializing in Windows internals, obfuscation techniques, and product security. We make public contributions and are dedicated to driving progress in InfoSec.

https://blog.back.engineering/

#Reverse

PS remoting and SSH ignores "Deny Logon restrictions"

If you enable SSHd on a Domain Controller, every domain user can log in

https://x.com/decoder_it/status/1809172242120519894?t=Xgh7R2DWKMDD_JUPQBW-Eg

#Windows

pyDFIRRam

Python library leveraging Volatility 3 to simplify and enhance memory forensics

https://github.com/PyDFIR/pyDFIRRam

#Forensics

StandaloneRunner

A collection of tools, scripts and personal research - nasbench/Misc-Research

https://github.com/nasbench/Misc-Research/blob/main/LOLBINs/StandaloneRunner.md

#Windows

TIKTAG: Breaking ARM’s Memory Tagging Extension with Speculative Execution

ARM Memory Tagging Extension (MTE) is a new hardware feature introduced in ARMv8.5-A architecture, aim-ing to detect memory corruption vulnerabilities...

https://arxiv.org/pdf/2406.08719

#Ring0

Setting up an x86-cpu

One way to go from a boot sector loaded by the BIOS with the CPU in 16-bit real mode to the CPU set up in 64-bit long mode. The setup is pretty bare-bones and there’s tons more to do.

https://thasso.xyz/2024/07/13/setting-up-an-x86-cpu.html

#Programming

Telegram Database Lookup

Check if your information has been leaked in a data breach!

https://t.me/haxalotBot

#Osint

blueTag

JTAGulator alternative based on Raspberry Pi Pico.

https://github.com/Aodrulez/blueTag

#Hardware

Buzzer

Buzzer is a fuzzer toolchain that allows to write eBPF fuzzing strategies.

https://github.com/google/buzzer

#Pwn

Chunkloader

Chunk Loader is a Chrome/firefox extension that allows users to load and import JavaScript chunks from a specified URL. This tool is designed for security researchers/bugbounty hunters to help them find bugs in react apps.

https://github.com/ElSicarius/chunkloader

#Web

Uncover digital footprints with OSINT Industries. A complete review.

Wondering if the tool is safe and worth using? I've done my research, so you won't have to.

https://www.osintteam.com/uncover-digital-footprints-with-osint-industries-a-complet-review/

#Osint

Start to Finish: Configuring an Android Phone for Pentesting

How to configure an Android Phone for Pentesting

https://www.blackhillsinfosec.com/start-to-finish-configuring-an-android-phone-for-pentesting/

#Mobile

A Look at Modern Windows Kernel Exploitation/Hacking

A Look at Modern Windows Kernel Exploitation/Hacking - Off By One Security

https://www.youtube.com/watch?v=nauAlHXrkIk

#Windows

Arkari

Yet another llvm based obfuscator based on goron.

https://github.com/KomiMoe/Arkari

#Reverse

This HTML parsing behavior is absolutely wtf...

This HTML parsing behavior is absolutely wtf... - Mizu twitter

https://x.com/kevin_mizu/status/1813951932639092785?t=tubG3GRxnZtv2lYh2_wJPA&s=19

#Web

Searchable FCC ID Database

The information resource for all wireless device applications filed with the FCC.

https://fccid.io/

#Hardware

Packet Safari Analyzer

Analyze packet traces and share them with the networking community.

https://app.packetsafari.com/

#Network

BF Database Search

Breachforums Database Search

https://bf.based.re/

#Osint

Return-Oriented Programming on RISC-V — Part 1

A theoretical perspective

https://infosecwriteups.com/return-oriented-programming-on-risc-v-part-1-dd9817b52d2b

#Pwn

ARM Stack Overflow Exploit – Defeating ASLR with ret2plt

Tutorial of ARM Stack Overflow Exploit – Defeating ASLR with ret2plt

https://www.fortinet.com/blog/threat-research/tutorial-of-arm-stack-overflow-exploit-defeating-aslr-with-ret2plt

#Pwn

Best Scraping Method

Always Check for the Hidden API when Web Scraping - John Watson Rooney

https://www.youtube.com/watch?v=DqtlR0y0suo

#Programming