SMBclient-ng : A Comprehensive Tool For Managing SMB Shares

0

SMBclient-ng is a robust and intuitive command-line tool designed to enhance interactions with SMB shares, offering a plethora of commands to manage and navigate both local and remote file systems. This versatile tool simplifies the process of connecting to SMB servers, handling files, and managing directories. Whether you're a network administrator or a security professional, SMBclient-ng provides the essential...

MemFiles : Enhancing CobaltStrike With In-Memory File Management

0

MemFiles is a toolkit for CobaltStrike that enables Operators to write files produced by the Beacon process into memory, rather than writing them to disk on the target system. It has been successfully tested on Windows 7, 10, and 11; corresponding server versions should work without issue. MemFiles is restricted to x64 Beacons. It accomplishes this by hooking several different...

Fileless ELF Execution – Running Binaries In Memory With FEE

0

This Python script generates interpreted code which creates the supplied ELF as a file in memory and executes it (without tmpfs). This makes it possible to execute binaries without leaving traces on the disk. The technique used for this is explained here. With default options for each interpreter, running binaries using fee does not write to disk whatsoever. This can be verified using tools...

Penetration Testing Tools – For Educational And Ethical Use

0

This repository contains a collection of tools and resources for penetration testing and security research. This repository is intended solely for educational purposes and ethical penetration testing. By accessing, using, or contributing to this repository, you agree to the following terms: Educational Use Only: The tools and information provided in this repository are for educational purposes only. They are designed to...

Red Team Interview Questions – A Deep Dive Into Red Teaming Essential

0

Welcome to the Red Team Interview Questions repository! This repository aims to provide a comprehensive list of topics and questions that can be helpful for both interviewers and candidates preparing for red team-related roles. Whether you're looking to assess your knowledge or preparing to interview candidates, these questions cover a wide range of essential topics in the field of...

GeoServer Vulnerability : Reverse Shell Execution For CVE-2024-36401

0

POC for CVE-2024-36401: RCE for GeoServer version prior to 2.25.1, 2.24.3 and 2.23.5 of GeoServer. This POC is based on the security advisory by phith0n. How It Works Sets up a listener on your machine for incoming reverse shell from the target. This POC will send a post request with the payloads. Attempts to establish a shell on the target server. This technique assumes nc...

Pathfinder : High-Resolution Control-Flow Attacks Exploiting The Conditional Branch Predictor

0

Researchers delve into the vulnerabilities inherent in Intel's branch prediction algorithms. Highlighting novel control-flow attacks, the study showcases techniques that leverage the Conditional Branch Predictor to manipulate and observe path history in modern CPUs. This pivotal research, conducted by experts from the University of California San Diego, opens new avenues for understanding and securing microarchitectural operations against potential exploits. System...

vArmor : Enhancing Container Security In Cloud-Native Environments

0

vArmor is a cloud-native container sandbox system. It leverages Linux's AppArmor LSM, BPF LSM and Seccomp technologies to implement enforcers. It can be used to strengthen container isolation, reduce the kernel attack surface, and increase the difficulty and cost of container escape or lateral movement attacks. You can leverage vArmor in the following scenarios to provide sandbox protection for containers within a Kubernetes cluster. In...

DOLOST – Harnessing Cyber Deception For Strategic Security Deployments

0

Explore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception. This tool automates the deployment of decoys and deceptive environments, enhancing security strategies. Learn how DOLOST not only creates but also meticulously designs these operations to outsmart and trap potential threats. Table Of Contents About Installation Usage Examples Contributing License About DOLOST is a framework designed to automate the creation and deployment of decoys and...

LDAP Firewall – Enhancing Security With Advanced Active Directory Protection

0

LDAP Firewall is an open-source tool for Windows servers that lets you audit and restrict incoming LDAP requests. Its primary use-cases are to protect Domain Controllers, block LDAP-based attacks and tightly control access to the Active Directory schema (e.g enforcing read-only access for users). The tool is written in C++ and makes use of the Microsoft Detours and JsonCpp packages. Some useful resources to get you started: Introduction...