Hacking

Hacking

183 bookmarks
Custom sorting
GitHub - miguelob/ICS-Hacking: This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
GitHub - miguelob/ICS-Hacking: This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested - GitHub - miguelob/ICS-Hacking: This reposi...
·github.com·
GitHub - miguelob/ICS-Hacking: This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigated and pentested
Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver | Aon
Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver | Aon
As we head into 2022, ransomware groups continue to plague our digital environment with new and interesting techniques to bypass Antivirus (AV) and Endpoint Detection and Response (EDR) solutions and ensuring the successful execution of their ransomware payloads.   In December 2021, Stroz Friedberg’s Incident Response Services team engaged in a Digital Forensics and Incident […]
·aon.com·
Yours Truly, Signed AV Driver: Weaponizing an Antivirus Driver | Aon
MSDT DLL Hijack UAC bypass - Sevagas
MSDT DLL Hijack UAC bypass - Sevagas
UAC Bypass via DLL hijacking of Microsoft Support Diagnostic Tool (MSDT). The UAC bypass method described here is based on DLL hijacking which happens when loading the Bluetooth diagnostic package.
·blog.sevagas.com·
MSDT DLL Hijack UAC bypass - Sevagas
GitHub - liamg/traitor: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
GitHub - liamg/traitor: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock - GitHub - liamg/traitor: Automatic Linux pr...
·github.com·
GitHub - liamg/traitor: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and ...
·github.com·
GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
ired.team
ired.team
My notes about all things red teaming experiments and more. (Very well done notes, great stuff on red teaming)
·ired.team·
ired.team