EDRSilencer: A Tool for Managing EDR Outbound Traffic with Windows Filtering Platform.

0

Inspired by the closed source FireBlock tool FireBlock from MdSec NightHawk, I decided to create my own version and this tool was created with the aim of blocking the outbound traffic of running EDR processes using Windows Filtering Platform (WFP) APIs. This tool offers the following features: Search known running EDR processes and add WFP filter to block its outbound traffic Add WFP filter...

Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets.

0

Of course! The piece "Cheat.sh: Unified Access to the Best Community Driven Cheat Sheets" talks about a new tool for programmers and IT experts. Cheat.sh has a simple interface that lets you quickly read cheat sheets for many programming languages, database management systems, and important UNIX and Linux commands. It stands out because it covers a lot of ground...

Red-Teamer Diaries: Insights and Techniques for Effective Penetration Testing

0

Publicly accessible notes about my pentesting/red teaming experiments tested on several controlled environments/infrastructures that involve playing with various tools and techniques used by penetration testers and redteamers during a security assessment. Contribute We welcome contributions as github pull requests.Kudos and thanks for the people who did the hard stuff Goals Pentest/red team cheatsheet that collects snippets of codes and commands to help pentester...

Windows Local Privilege Escalation Cookbook (In Progress)

0

Description (Keynote) This Cookbook was created with the main purpose of helping people understand local privilege escalation techniques on Windows environments. Moreover, it can be used for both attacking and defensive purposes. ℹ️ This Cookbook focuses only on misconfiguration vulnerabilities on Windows workstations/servers/machines. Evasion techniques to bypass security protections, endpoints, and antivirus are not included in this cookbook. I created this PowerShell...

HackBrowserData: A Comprehensive Guide to Decrypting and Exporting Data from Popular Browsers

0

HackBrowserData is a command-line tool for decrypting and exporting browser data ( passwords, history, cookies, bookmarks, credit cards, download records, localStorage and extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux. Install Installation of HackBrowserData is dead-simple, just download the release for your system and run the binary. Building from source only support go 1.18+ with go generics $...

Linpmem – A Physical Memory Acquisition Tool for Linux

0

Linpmem is a Linux x64-only tool for reading physical memory. Like its Windows counterpart, Winpmem, this is not a traditional memory dumper. Linpmem offers an API for reading from any physical address, including reserved memory and memory holes, but it can also be used for normal memory dumping. Furthermore, the driver offers a variety of access modes to read physical memory, such as byte, word, dword,...

Process Stomping: Advanced Technique for Executing Shellcode in Targeted Executable Sections

0

Cybersecurity is a field that is always changing, and new techniques are always being made to improve both offensive and defensive tactics. Process Stomping is an improved version of Process Overwriting that was first used by Aleksandra Doniec (hasherezade) and is now being studied by others in the field. This method is better than others because it precisely and...

CLZero: Fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors

0

CLZero is a strong program that helps security experts and penetration testers find and use attack vectors for HTTP/1.1 CL.0 Request Smuggling. Request smuggling is a major security hole in web applications that can let hackers in and cause data to leak, among other bad things. CLZero was based on the tool Smuggler and uses attack gadgets that were...

KnowsMore: Active Directory and Password Analysis Tool

0

KnowsMore is a powerful program made for people who work in network security and Active Directory control. There are many tools it comes with that let you look at and control Active Directory settings, BloodHound data, NTDS hashes, and crack passwords. Users can import and connect important data, check the strength of passwords, look for users and hashes, and...

Top 3 Cybersecurity Trends for SME Business Leaders in 2024

0

As Cynet’s COO, my team and I get to work closely with risk management executives at small-to-medium enterprises (SMEs) around the world. In this article, I'll condense our collaboration's insights into three key trends for 2024, backed up by data and research from all areas of cybersecurity practice. These emerging patterns pertain to organizations of all shapes and sizes...