Web安全
proxyhub:能够查找公共代理服务器的工具
https://github.com/ForceFledgling/proxyhub
nuclei-ai-extension:可快速生成Nuclei模板的浏览器扩展
https://github.com/projectdiscovery/nuclei-ai-extension
内网渗透
滥用Windows Access链接表功能强制进行NTLM认证
https://research.checkpoint.com/2023/abusing-microsoft-access-linked-table-feature-to-perform-ntlm-forced-authentication-attacks/
hashcathelper:NTLM破解分析工具,支持结果倒入BloodHound
https://github.com/SySS-Research/hashcathelper
终端对抗
SharpReflectivePEInjection:本地和远程反射加载和执行PE,绕过EDR hook
https://github.com/cpu0x00/SharpReflectivePEInjection
GoSleepyCrypt:通过Shellcode函数对Go应用程序进行内存睡眠加密和堆加密
https://github.com/parzel/GoSleepyCrypt
titan:VMProtect去虚拟化工具
https://github.com/archercreat/titan
揭露Cobalt Strike中的make_token命令
https://research.nccgroup.com/2023/11/10/demystifying-cobalt-strikes-make_token-command/
漏洞相关
CVE-2023-32530:趋势科技Apex Central 2019后台RCE
https://starlabs.sg/advisories/23/23-32530/
CVE-2023-32629&CVE-2023-2640:Ubuntu提权漏洞PoC
https://github.com/ThrynSec/CVE-2023-32629-CVE-2023-2640---POC-Escalation
CVE-Half-Day-Watcher:利用NVD API 在官方补丁发布之前通过GitHub识别最近发布的CVE
https://github.com/Aqua-Nautilus/CVE-Half-Day-Watcher
ai-exploits:AI/ML漏洞利用集合
https://github.com/protectai/ai-exploits
云安全
利用受陷etcd获取集群及节点的完全控制
https://research.nccgroup.com/2023/11/07/post-exploiting-a-compromised-etcd-full-control-over-the-cluster-and-its-nodes/
Azure AD Kerberos票证在云环境中的利用
https://www.trustedsec.com/blog/azure-ad-kerberos-tickets-pivoting-to-the-cloud
其他
Bobber:Evilginx数据库监控与渗漏自动化
https://github.com/Flangvik/Bobber
SharpVeeamDecryptor:解密Veeam数据库密码的工具
https://github.com/S3cur3Th1sSh1t/SharpVeeamDecryptor
shh:基于分析syscall调用实现systemd服务自动化加固的工具
https://www.synacktiv.com/en/publications/systemd-hardening-made-easy-with-shh
https://github.com/synacktiv/shh
MAAS:利用gitlab的CI/CD功能来构建恶意软件即服务
https://github.com/yoda66/MAAS
M01N Team公众号
聚焦高级攻防对抗热点技术
绿盟科技蓝军技术研究战队
官方攻防交流群
网络安全一手资讯
攻防技术答疑解惑
扫码加好友即可拉群
往期推荐