Большой сборник блог/PoC методов инъекции в процессы для Windows и Linux
https://github.com/itaymigdal/awesome-injection
Думаю, он еще будет активно пополняться)
#pentest #redteam #maldev
https://github.com/itaymigdal/awesome-injection
Думаю, он еще будет активно пополняться)
#pentest #redteam #maldev
GitHub
GitHub - itaymigdal/awesome-injection: Centralized resource for listing and organizing known injection techniques and POCs
Centralized resource for listing and organizing known injection techniques and POCs - itaymigdal/awesome-injection
CVE-2025-21204: LPE in Windows Update Stack
Exploit: https://raw.githubusercontent.com/eshlomo1/CloudSec/refs/heads/main/Attacking%20the%20Cloud/CVE-2025-21204/Exploit-CVE2025-UpdateStackLPE-NonAdmin.ps1
Blog: https://cyberdom.blog/abusing-the-windows-update-stack-to-gain-system-access-cve-2025-21204/
Patched: Apr 10, 2025
#ad #pentest #redteam #lpe
Exploit: https://raw.githubusercontent.com/eshlomo1/CloudSec/refs/heads/main/Attacking%20the%20Cloud/CVE-2025-21204/Exploit-CVE2025-UpdateStackLPE-NonAdmin.ps1
Blog: https://cyberdom.blog/abusing-the-windows-update-stack-to-gain-system-access-cve-2025-21204/
Patched: Apr 10, 2025
#ad #pentest #redteam #lpe
Forwarded from Adaptix Framework
AdaptixC2 v0.4 is out
https://github.com/Adaptix-Framework/AdaptixC2
* New Linux/MacOS "gopher" agent
* TCP/mTLS external listener for "gopher" agent
* New internal TCP listener for "beacon" agent
* Monitoring of "working time" and "exitdate" agent parameters
* Screenshot storage
More details in the changelog: https://adaptix-framework.gitbook.io/adaptix-framework/changelog/v0.3-greater-than-v0.4
https://github.com/Adaptix-Framework/AdaptixC2
* New Linux/MacOS "gopher" agent
* TCP/mTLS external listener for "gopher" agent
* New internal TCP listener for "beacon" agent
* Monitoring of "working time" and "exitdate" agent parameters
* Screenshot storage
More details in the changelog: https://adaptix-framework.gitbook.io/adaptix-framework/changelog/v0.3-greater-than-v0.4
Многофункциональный сканер портов на C
https://github.com/django-88/NomadScanner
ToDo интересный, код компактный, обязательно послежу за проектом))
UPD: как альтернатива (и уже готовый модуль для sliver) есть такое: https://github.com/art3x/ascan_sliver
#pentest #redteam #recon #scan #tools
https://github.com/django-88/NomadScanner
ToDo интересный, код компактный, обязательно послежу за проектом))
UPD: как альтернатива (и уже готовый модуль для sliver) есть такое: https://github.com/art3x/ascan_sliver
#pentest #redteam #recon #scan #tools
Forwarded from 1N73LL1G3NC3
Bolthole
A proof-of-concept ClickOnce payload for Red Teams to establish initial access.
• Reverse SSH tunnel into the target environment
• CMD shell access as the executing user (no password required)
• SOCKS proxy functionality for pivoting
A proof-of-concept ClickOnce payload for Red Teams to establish initial access.
• Reverse SSH tunnel into the target environment
• CMD shell access as the executing user (no password required)
• SOCKS proxy functionality for pivoting
Несколько часов назад была сильно обновлена утилита certipy. Обратим внимание, что в документации также появилось описание техники ESC16...
#redteam #pentest #ad #adcs
#redteam #pentest #ad #adcs
GitHub
GitHub - ly4k/Certipy: Tool for Active Directory Certificate Services enumeration and abuse
Tool for Active Directory Certificate Services enumeration and abuse - ly4k/Certipy
Forwarded from APT
🔐 Bitrix CMS Ultimate Pentest Guide
A detailed guide on penetration testing for 1C-Bitrix CMS, one of the most popular content management systems in CIS countries. The guide covers authentication bypasses, XSS, SSRF, LFI, RCE exploits, WAF bypass methods, and vulnerabilities in third-party modules (especially Aspro).
🔗 Source:
https://pentestnotes.ru/notes/bitrix_pentest_full/
#1c #bitrix #web
A detailed guide on penetration testing for 1C-Bitrix CMS, one of the most popular content management systems in CIS countries. The guide covers authentication bypasses, XSS, SSRF, LFI, RCE exploits, WAF bypass methods, and vulnerabilities in third-party modules (especially Aspro).
🔗 Source:
https://pentestnotes.ru/notes/bitrix_pentest_full/
#1c #bitrix #web
Вот такой крутой ресерч сегодня подъехал. От учетных записей dMSA до администратора домена. А с учетом того, что dMSA можно создать самому (при определенных, но часто встречающихся условиях), это прям крутой Low Fruit. Особенно с учетом того, что Майкрософт пока не собирается это исправлять.
https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory
Но! Стоит также отметить, что dMSA появились только на Windows Server 2025))
Soft: https://github.com/logangoins/SharpSuccessor
Soft: https://github.com/Pennyw0rth/NetExec/pull/702
Soft: https://gist.github.com/snovvcrash/a1ae180ab3b49acb43da8fd34e7e93df
#pentest #redteam #ad #privesc
https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory
Но! Стоит также отметить, что dMSA появились только на Windows Server 2025))
Soft: https://github.com/logangoins/SharpSuccessor
Soft: https://github.com/Pennyw0rth/NetExec/pull/702
Soft: https://gist.github.com/snovvcrash/a1ae180ab3b49acb43da8fd34e7e93df
#pentest #redteam #ad #privesc
Akamai
BadSuccessor: Abusing dMSA to Escalate Privileges in Active Directory
Akamai researchers found a privilege escalation vulnerability in Windows Server 2025 that allows attackers to compromise any user in Active Directory.
Forwarded from 1N73LL1G3NC3
Please open Telegram to view this post
VIEW IN TELEGRAM
Про принудительную аутентификацию Windows в 2025 году
https://blog.redteam-pentesting.de/2025/windows-coercion/
Вместе с постом несколько скриптов:
Софт wspcoerce: https://github.com/RedTeamPentesting/wspcoerce
Модуль NetExec efsr_spray: https://github.com/Pennyw0rth/NetExec/pull/718
ntlmrelayx RPC server and EPM: https://github.com/fortra/impacket/pull/1974
#ad #coerce #pentest #redteam
https://blog.redteam-pentesting.de/2025/windows-coercion/
Вместе с постом несколько скриптов:
Софт wspcoerce: https://github.com/RedTeamPentesting/wspcoerce
Модуль NetExec efsr_spray: https://github.com/Pennyw0rth/NetExec/pull/718
ntlmrelayx RPC server and EPM: https://github.com/fortra/impacket/pull/1974
#ad #coerce #pentest #redteam
RedTeam Pentesting - Blog
The Ultimate Guide to Windows Coercion Techniques in 2025
Windows authentication coercion often feels like a magic bullet against the average Active Directory. With any old low-privileged account, it usually allows us to gain full administrative access to almost arbitrary Windows workstations and servers, …
Полный гайд по эксплуатации ADCS от ESC1 до ESC16. Понятно, что материалов по этой теме и так много, но пусть будет под рукой))
https://xbz0n.sh/blog/adcs-complete-attack-reference
#ad #adcs #privesc #pentest #redteam
https://xbz0n.sh/blog/adcs-complete-attack-reference
#ad #adcs #privesc #pentest #redteam
xbz0n.sh
Breaking ADCS: ESC1 to ESC16 Attack Techniques
Let's talk about Active Directory Certificate Services. If you've been doing red team work for any length of time, you've probably heard about ADCS attacks. ...
CVE-2025-49113: Roundcube (1.6.10) Auth RCE
blog: https://fearsoff.org/research/roundcube
PoC: https://github.com/fearsoff-org/CVE-2025-49113
#exploit #git #pentest #redteam
blog: https://fearsoff.org/research/roundcube
PoC: https://github.com/fearsoff-org/CVE-2025-49113
#exploit #git #pentest #redteam
fearsoff.org
Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization [CVE-2025-49113]
A deep technical breakdown of CVE-2025-49113, a critical Roundcube vulnerability involving PHP session serialization. Learn how the bug was discovered, exploited, and responsibly disclosed with full PoC and recommendations for defenders and developers. Kirill…
CVE-2025-33073: Reflective Kerberos Relay (LPE)
Blog: https://blog.redteam-pentesting.de/2025/reflective-kerberos-relay-attack/
Patched: June 10, 2025
Интересная LPE с релеем на себя... Даже CVE есть)
#lpe #ad #relay #pentest #redteam
Blog: https://blog.redteam-pentesting.de/2025/reflective-kerberos-relay-attack/
Patched: June 10, 2025
Интересная LPE с релеем на себя... Даже CVE есть)
#lpe #ad #relay #pentest #redteam
RedTeam Pentesting - Blog
A Look in the Mirror - The Reflective Kerberos Relay Attack
It is a sad truth in IT security that some vulnerabilities never quite want to die and time and time again, vulnerabilities that have long been fixed get revived and come right back at you. While researching relay attacks, the bane of Active …
Ralf Hacker Channel
CVE-2025-33073: Reflective Kerberos Relay (LPE) Blog: https://blog.redteam-pentesting.de/2025/reflective-kerberos-relay-attack/ Patched: June 10, 2025 Интересная LPE с релеем на себя... Даже CVE есть) #lpe #ad #relay #pentest #redteam
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from 1N73LL1G3NC3
BloodHound Query Library
A collection of Cypher queries designed to help BloodHound users to unlock the full potential of the BloodHound platform by creating an open query ecosystem.
Blog: https://specterops.io/blog/2025/06/17/introducing-the-bloodhound-query-library/
A collection of Cypher queries designed to help BloodHound users to unlock the full potential of the BloodHound platform by creating an open query ecosystem.
Blog: https://specterops.io/blog/2025/06/17/introducing-the-bloodhound-query-library/
Forwarded from Adaptix Framework
AdaptixC2 v0.6 is out
https://github.com/Adaptix-Framework/AdaptixC2
* Обновленная консоль агента с гибкими настройками
* Оповещения в Telegram
* OTP для синхронизации файлов и команд
* Новая тема Dracula
* Обновление до Golang 1.24.4
Полная информация по обновлению: https://adaptix-framework.gitbook.io/adaptix-framework/changelog/v0.5-greater-than-v0.6
https://github.com/Adaptix-Framework/AdaptixC2
* Обновленная консоль агента с гибкими настройками
* Оповещения в Telegram
* OTP для синхронизации файлов и команд
* Новая тема Dracula
* Обновление до Golang 1.24.4
Полная информация по обновлению: https://adaptix-framework.gitbook.io/adaptix-framework/changelog/v0.5-greater-than-v0.6
Сразу две статьи от SpecterOps, можно считать, одна - продолжение другой. В блоге разбирают атаки на трасты AD, но с упором на BloodHound CE.
1. Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound
2. Untrustworthy Trust Builders: Account Operators Replicating Trust Attack (AORTA)
Даже если не собираетесь погружаться в BHCE, стоит просто бегло почитать))
#pentest #redteam #ad #trust #lateralmovement #bloodhound
1. Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound
2. Untrustworthy Trust Builders: Account Operators Replicating Trust Attack (AORTA)
Даже если не собираетесь погружаться в BHCE, стоит просто бегло почитать))
#pentest #redteam #ad #trust #lateralmovement #bloodhound
SpecterOps
Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound - SpecterOps
The ability of an attacker controlling one domain to compromise another through an Active Directory (AD) trust depends on the trust type and configuration. To better map these relationships and make it easier to identify cross-domain attack paths, we are…