We looked inside some of the tweets by @h4z3dic and here's what we found interesting.
Inside 100 Tweets
Last Seen Profiles@_entanglements_ @dcobner @sezerruzun @MunCorpGurugram @Antsysh @creepiepanda @0bhkgv @turbula @BDBicer @nuriyeongor @ileri_kayra @NataliaZard @uk_yildiz @FitSidney @dJDEEPOISE @Ali_hsen_kurdi
WMI 101 for Pentesters by @OsandaMalith https://www.ethicalhacker.net/features/root/wmi-101-for-pentesters/
CVE-2020-0688 - Exchange Server - https://github.com/random-robbie/cve-2020-0688 https://github.com/Ridter/cve-2020-0688 https://github.com/Jumbo-WJB/CVE-2020-0688 https://github.com/Yt1g3r/CVE-2020-0688_EXP
Catch a sneak peek via @44CON of Max Kamper's upcoming HeapLab GLIBC Exploitation class at #44Con in March. https://youtu.be/s-GJ-buCGio
Then join Max at #Ringzer0 in August to learn over 11 different heap exploitation techniques ⚡️ http://bit.ly/ringzero-heapexploitation
Sentinel-ATT&CK v.1.2 released! This version brings huge additions to the #ThreatHunting workbooks.
@olafhartong's amazing threat hunting drilldowns from his Splunk app have been ported to #AzureSentinel 🚀🚀🚀
Find out more: https://github.com/BlueTeamLabs/sentinel-attack and https://github.com/BlueTeamLabs/sentinel-attack/wiki/Deploying-hunting-workbooks
A collection of several IOT/firmware fuzzers, https://github.com/zyw-200
New #ATM #Malware for your zoo. No AV-detection so far. First uploaded to VT in December 2019 from Brazil. #YARA rule is here: https://raw.githubusercontent.com/fboldewin/YARA-rules/master/ATM.Malware.DispCashBR.yar Hash 7cea6510434f2c8f28c9dbada7973449bb1f844cfe589cdc103c9946c2673036 #DFIR
Want to start to fuzz like a boss?
--> Materials of the "#Fuzzing with #AFL" workshop - An excellent intro ! by @michael_macnair
A bit deeper dive into containers. We look at some Linux Kernel sources and learn about the nsenter command.
In the early days of #bugbounty I always had a hard time with massDNS to use it effectively on a daily basis and always wanted something around it to make the process simpler and finally, at @pdiscoveryio we are open-sourcing #shuffleDNS
I recently ported @osxreverser excellent UEFI DXE emulator to Windows. Now you can build the emulator from within VS and then use it to trace through your favorite DXE-phase driver.
Contributions are welcome 🙂
Tool Release: Pleased to announce @gadhiyasavan’s tool UDP-Hunter which quickly scans for UDP services along with guidance as to what can be done with those open ports. PS: works for IPv4 and IPv6. Blogpost: https://www.gadhiyasavan.com/2020/02/udp-hunter.html & Code: https://github.com/NotSoSecure/udp-hunter
Small @GHIDRA_RE script that colors executed instructions to ease the debug procedure. Hope soon will add regs state to it :))
YARA rule to detect Exchange servers vulnerable to CVE-2020-0688
Blog post by @thezdi
📝New Research: "Weaponizing a Lazarus Group Implant": https://objective-see.com/blog/blog_0x54.html
On repurposing Lazarus APT group's (🇰🇵) 1st-stage implant, to execute custom 2nd-stage payloads directly from memory! 😁😈
....also @cylanceinc code (ab)used in the malware?! 😂
Set up your own #Malware analysis lab with VirtualBox, INetSim and Burp https://blog.christophetd.fr/malware-analysis-lab-with-virtualbox-inetsim-and-burp/
Multiple Ways to Exploit Windows Systems using Macros https://www.hackingarticles.in/multiple-ways-to-exploit-windows-systems-using-macros/
BlueGate vulnerability internals (CVE-2020-0609 & CVE-2020-0610)