Hacking

Hacking

80 bookmarks
Custom sorting
GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities. - GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, lib...
·github.com·
GitHub - h3xduck/TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
PHP Object Injection | OWASP Foundation
PHP Object Injection | OWASP Foundation
PHP Object Injection on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
·owasp.org·
PHP Object Injection | OWASP Foundation
11 stakeholder strategies for red team success
11 stakeholder strategies for red team success
These best practices will help ensure a successful red team exercise by getting all the stakeholders on the same page.
·csoonline.com·
11 stakeholder strategies for red team success
Hack.Learn.Share
Hack.Learn.Share
This blog contains write-ups of the things that I researched, learned, and wanted to share to others.
·captmeelo.com·
Hack.Learn.Share
Build your first LLVM Obfuscator
Build your first LLVM Obfuscator
Welcome to a tutorial on building your first LLVM based obfuscator. In this post we will list the advantages of using LLVM tools, briefly…
·polarply.medium.com·
Build your first LLVM Obfuscator
GitHub - miguelob/ICS-Hacking: This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
GitHub - miguelob/ICS-Hacking: This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested - GitHub - miguelob/ICS-Hacking: This reposi...
·github.com·
GitHub - miguelob/ICS-Hacking: This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
GitHub - looCiprian/GC2-sheet: GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
GitHub - looCiprian/GC2-sheet: GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive. - GitHub - looCiprian/GC2-sheet...
·github.com·
GitHub - looCiprian/GC2-sheet: GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver | Aon
Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver | Aon
As we head into 2022, ransomware groups continue to plague our digital environment with new and interesting techniques to bypass Antivirus (AV) and Endpoint Detection and Response (EDR) solutions and ensuring the successful execution of their ransomware payloads.   In December 2021, Stroz Friedberg’s Incident Response Services team engaged in a Digital Forensics and Incident […]
·aon.com·
Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver | Aon
MSDT DLL Hijack UAC bypass - Sevagas
MSDT DLL Hijack UAC bypass - Sevagas
UAC Bypass via DLL hijacking of Microsoft Support Diagnostic Tool (MSDT). The UAC bypass method described here is based on DLL hijacking which happens when loading the Bluetooth diagnostic package.
·blog.sevagas.com·
MSDT DLL Hijack UAC bypass - Sevagas