Hacking

Hacking

162 bookmarks
Custom sorting
11 stakeholder strategies for red team success
11 stakeholder strategies for red team success
These best practices will help ensure a successful red team exercise by getting all the stakeholders on the same page.
·csoonline.com·
11 stakeholder strategies for red team success
Hack.Learn.Share
Hack.Learn.Share
This blog contains write-ups of the things that I researched, learned, and wanted to share to others.
·captmeelo.com·
Hack.Learn.Share
Build your first LLVM Obfuscator
Build your first LLVM Obfuscator
Welcome to a tutorial on building your first LLVM based obfuscator. In this post we will list the advantages of using LLVM tools, briefly…
·polarply.medium.com·
Build your first LLVM Obfuscator
GitHub - miguelob/ICS-Hacking: This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
GitHub - miguelob/ICS-Hacking: This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested - GitHub - miguelob/ICS-Hacking: This reposi...
·github.com·
GitHub - miguelob/ICS-Hacking: This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver | Aon
Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver | Aon
As we head into 2022, ransomware groups continue to plague our digital environment with new and interesting techniques to bypass Antivirus (AV) and Endpoint Detection and Response (EDR) solutions and ensuring the successful execution of their ransomware payloads.   In December 2021, Stroz Friedberg’s Incident Response Services team engaged in a Digital Forensics and Incident […]
·aon.com·
Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver | Aon
MSDT DLL Hijack UAC bypass - Sevagas
MSDT DLL Hijack UAC bypass - Sevagas
UAC Bypass via DLL hijacking of Microsoft Support Diagnostic Tool (MSDT). The UAC bypass method described here is based on DLL hijacking which happens when loading the Bluetooth diagnostic package.
·blog.sevagas.com·
MSDT DLL Hijack UAC bypass - Sevagas
GitHub - liamg/traitor: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
GitHub - liamg/traitor: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock - GitHub - liamg/traitor: Automatic Linux pr...
·github.com·
GitHub - liamg/traitor: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock