CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within the Chromium web browser which allowed for a sandbox escape from a browser extension. To run these, you must be on a version of Chromium older than 126.0.6478.54. Write up Bug report Both the CVE-2024-5386 and CVE-2024-6778 directories contains a POC Chrome extension that is able to...
Rust BOFs – Unlocking New Potentials In Cobalt Strike
This took me like 4 days (+2 days for an update), but I got it working... rust core + alloc for Cobalt Strike BOFs.This is very much a PoC, but I'd love to see others playing around with it and contributing. Building Install mingw Install nightly rust with the x86_64-pc-windows-gnu and i686-pc-windows-gnu toolchains Run cargo install cargo-make Run cargo make ???? BOFit Make Your Own Edit the entry...
MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is a 100% custom-built C# LDAP parser that handles tokenization and syntax tree parsing along with numerous custom properties that enable accurate and efficient obfuscation, deobfuscation and detection of LDAP SearchFilters. The rest of the project is a PowerShell wrapper designed for maximum flexibility, randomization and...
Cloudkicker – Implementing Basic Authentication ith .htaccess And htpasswd
There are a number of excellent tutorials. I recommend this one: Basically, you are going to create a .htaccess file in the directory you want to protect. This .htaccess file will have a line in it, AuthUserFile, that will point to an htpasswd file. Authtype Basic AuthName "RESTRICTED - cloudkicker" AuthUserFile <path to your htpasswd file> Require valid-user The htpasswd file should be placed outside...
Pwnlook – A Deep Dive Into Outlook Email Exploitation
Pwnlook is an offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails configured in it. What it does: List mailboxes List folders Gather emails information Read email Search by recipient or subject Download attachments It's possible to do almost everything that Outlook can do: send emails, create forward rules, list contacts... But all this is out...
EDRenum-BOF : Compiling Insights On Endpoint Detection And Response
In the evolving landscape of cybersecurity, understanding and mitigating threats through advanced tools is paramount. "EDRenum-BOF" emerges as a critical utility designed to streamline the process of identifying and assessing Endpoint Detection and Response (EDR) systems. This article delves into the functionalities of EDRenum-BOF, demonstrating its capability to identify common EDR processes, directories, and services, thereby enhancing security penetration...
Penelope – A Versatile Shell Handler For Exploiting RCE Vulnerabilities
Penelope is a shell handler designed to be easy to use and intended to replace netcat when exploiting RCE vulnerabilities. It is compatible with Linux and macOS and requires Python 3.6 or higher. It is a standalone script that does not require any installation or external dependencies, and it is intended to remain this way. Among the main features are: Auto-upgrade...
Vulnhuntr – Unleashing LLMs For Advanced Security Vulnerability Detection In Codebases
Vulnhuntr leverages the power of LLMs to automatically create and analyze entire code call chains starting from remote user input and ending at server output for detection of complex, multi-step, security-bypassing vulnerabilities that go far beyond what traditional static code analysis tools are capable of performing. See all the details including the Vulnhuntr output for all the 0-days here:...
LsassReflectDumping – A Deep Dive Into Secure Credential Extraction Techniques
This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone is created, it utilizes MINIDUMP_CALLBACK_INFORMATION callbacks to generate a memory dump of the cloned process. Steps Getting the handle of Lsass.exe process Cloning Lsass.exe process using RtlCreateProcessReflection (Process Forking) Using MINIDUMP_CALLBACK_INFORMATION callbacks to create cloned process minidump Confirming the dump content and size. Terminating the cloned...
CVE-2024-30090 : LPE Proof Of Concept Detailed
In the evolving landscape of cybersecurity, understanding the mechanisms behind vulnerabilities is crucial for both mitigation and responsible exploitation. This article dives into CVE-2024-30090, a significant Local Privilege Escalation (LPE) vulnerability uncovered by the renowned security researcher Angelboy and his team at DEVCORE. Here, we provide an in-depth analysis and a step-by-step Proof of Concept (PoC) for exploiting this...