EDRPrison – Advanced Evasion Techniques Using Legitimate WFP Drivers

0

EDRPrison leverages a legitimate WFP callout driver, WinDivert, to effectively silence EDR systems. Drawing inspiration from tools like Shutter, FireBlock, and EDRSilencer, this project focuses on network-based evasion techniques. Unlike its predecessors, EDRPrison installs and loads an external legitimate WFP callout driver instead of relying solely on the built-in WFP. Additionally, it blocks outbound traffic from EDR processes by dynamically adding runtime filters...

Using Hardware -Based Exploits : A Comprehensive Guide To Braktooth, Internalblue, And Automated Techniques

0

You need to buy the following hardware to be able to run the exploits: The installation is partially automated in the toolkit. Consult repository for other information. Once you have needed hardware: you need to connect it to your machine Then run the following command ls -la /dev/tty* If you see /dev/ttyUSB0 and /dev/ttyUSB1 then the development board is connected and you can start writing to it To continue Braktooth...

Manual Exploits – Assessing Device Security Through Direct Interaction

0

This check could be used to assess the severity of the attacks. If the target device is pairable even if the user does not navigate to the pairing/discovery menu then such a device has a higher exposure to the threats. It should be noted that previous research showed that Bluetooth MAC addresses could be passively collected with a high probability. To...

Workflow – Comprehensive Guide To Using BlueToolkit For Bluetooth Vulnerability Testing

0

The toolkit has several ways it could be used, due to its modular nature, but the main feature of it is to test the Bluetooth Classic enabled device for possible known vulnerabilities. The modular nature of the toolkit allows a user to test either a specific vulnerability, all of them at once or a specific family of vulnerabilities if...

Awesome Red Teaming – A Comprehensive Guide To Advanced Security Techniques

0

Explore the dynamic world of red teaming with our extensive guide designed for cybersecurity professionals and enthusiasts alike. 'Awesome Red Teaming' offers a treasure trove of resources, techniques, and tools that are essential for mastering adversarial tactics and strategies. This living document is continuously updated to keep pace with the latest in Mitre ATT&CK frameworks and beyond. List of Awesome Red...

Awesome OSINT – A Comprehensive Resource For Cybersecurity Experts

0

A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources). This list is to help all of those who are into Cyber Threat Intellience (CTI), threat hunting, or OSINT....

Pwnat : Bridging NAT Barriers Without Port Forwarding

0

pwnat, by Samy Kamkar, is a tool that allows any client behind a NAT to communicate with a server behind a separate NAT with no port forwarding and no DMZ setup on any routers in order to directly communicate with each other. There is no middle man, no proxy, no third party, no UPnP required, no spoofing, no DNS tricks. The server does not...

CLI Usage : Command-Line Mastery With The BlueKit Toolkit

0

Explore the comprehensive command-line interface (CLI) of the BlueKit toolkit designed for cybersecurity professionals. This article delves into the various CLI commands and options available, providing detailed explanations on how to effectively manage and deploy exploits. Whether you're checking system setups or running targeted exploits, this guide equips you with the necessary knowledge to leverage the full potential of...

apkInspector – A Comprehensive Tool For APK Analysis And Evasion Detection

0

apkInspector is a tool designed to provide detailed insights into the zip structure of APK files, offering the capability to extract content and decode the AndroidManifest.xml file. What sets APKInspector apart is its adherence to the zip specification during APK parsing, eliminating the need for reliance on external libraries. This independence, allows APKInspector to be highly adaptable, effectively emulating...

WinRM Client Certificate Authentication : Step-By-Step Setup And Configuration Guide

0

This repo demonstrates how to create certificates for WinRM/WSMan client certificate authentication and how to configure Windows to setup the service side to allow those certificates for client authentication. It has some Ansible playbooks that can be used to do all the necessary steps plus some standalone scripts and background information to help you understand how certificate authentication works...