In this article, I will present a new technique to bypass Microsoft’s Anti-Malware Scan Interface (AMSI) using API Call Hooking of CLR methods. https://practicalsecurityanalytics.com/new-amsi-bypass-using-clr-hooking/
Continue readingCategory: Gefundenes
Sponsor j3ssie/Osmedeus
What is Osmedeus? Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. Next generation version? Enjoying this tool? Support it’s development and take your game to …
Continue readingWeb Security Academy
This cross-site scripting (XSS) cheat sheet contains many vectors that can help you bypass WAFs and filters. You can select vectors by the event, tag or browser and a proof of concept is included for …
Continue readinggoogle/osv-scanner
Use OSV-Scanner to find existing vulnerabilities affecting your project’s dependencies. OSV-Scanner provides an officially supported frontend to the OSV database that connects a project’s list of dependencies with the vulnerabilities that affect them. Since the …
Continue readingdeepinstinct/Dirty-Vanity
The reflected shellcode works with ntdll API. It is generated from the included generation project shellcode_template, curtesy of https://github.com/rainerzufalldererste/windows_x64_shellcode_template https://github.com/deepinstinct/Dirty-Vanity
Continue readingGame Of Active Directory v2
The second version of Game Of Active directory is out! https://github.com/Orange-Cyberdefense/GOAD https://mayfly277.github.io/posts/GOADv2/
Continue readingPyramid – A Tool To Help Operate In EDRs’ Blind Spots
Pyramid is a set of Python scripts and module dependencies that can be used to evade EDRs. The main purpose of the tool is to perform offensive tasks by leveraging some Python evasion properties and …
Continue readingMFASweep
MFASweep is a PowerShell script that attempts to log in to various Microsoft services using a provided set of credentials and will attempt to identify if MFA is enabled. https://github.com/dafthack/MFASweep
Continue readingMonitor hybrid security using Microsoft Defender for Cloud and Microsoft Sentinel
This reference architecture illustrates how to use Microsoft Defender for Cloud and Microsoft Sentinel to monitor the security configuration and telemetry of on-premises and Azure operating system workloads. This includes Azure Stack. Download a Visio …
Continue readingFlorian Roth ⚡
ORKL Search Engine for Threat Intelligence Reports by @RobertHaist https://t.co/RDqh7l4Kl3 https://twitter.com/cyb3rops/status/1588189837995147265
Continue reading