ExAndroidDev's profile picture. Ex android developer, pentester, red teaming enthusiast

Ex Android Dev

@ExAndroidDev

Ex android developer, pentester, red teaming enthusiast

Ex Android Dev 已转帖

🚨 If you haven’t tested your Microsoft 365 environment like an APT, the time is now! Introducing msInvader, an adversary simulation tool designed to emulate attack techniques within M365 and Azure environments. 🔑 Key Features: •Versatile Authentication Simulation: 🔄 Supports…


Ex Android Dev 已转帖

At #Pwn2Own Ireland, our team successfully exploited vulnerabilities in the Lorex 2K Indoor WiFi Camera. Check out our blog for the full technical breakdown: blog.infosectcbr.com.au/2024/12/exploi…


Ex Android Dev 已转帖

Today James Forshaw (@tiraniddo) did a quick assessment on the new Windows 11 Sudo.exe. Despite his quick assessment, the blog post is wonderful. It is an excellent read. We recommend it:) tl;dr fancier ShellExecute 😭 tiraniddo.dev/2024/02/sudo-o…


Ex Android Dev 已转帖

Do you want to start the RemoteRegistry service without Admin privileges? Just write into the "winreg" named pipe 👇

splinter_code's tweet image. Do you want to start the RemoteRegistry service without Admin privileges?
Just write into the "winreg" named pipe 👇

Ex Android Dev 已转帖

🚨 Beware, Mac users! MetaStealer, a new info-stealer #malware, is targeting #macOS. Learn how it's posing as prospective clients to trick victims into launching malicious payloads. Learn more: thehackernews.com/2023/09/beware… #cybersecurity #hacking


Ex Android Dev 已转帖

In our latest post, @breakfix details how we were able to publish a malicious VSCode extension to the marketplace and leverage it for initial access during a red team mdsec.co.uk/2023/08/levera… vimeo.com/853281700?shar…

MDSecLabs's tweet card. Phishing with Visual Studio Code

vimeo.com

Vimeo

Phishing with Visual Studio Code


Ex Android Dev 已转帖

Here is my #exploit and blog post for the VMWare Aria Operations for Networks which has CVSS 9.8 and targets all the versions from 6.0 to 6.10 (CVE-2023-34039) Apparently VMware forgot to regenerate their SSH keys 🔐 summoning.team/blog/vmware-vr…

SinSinology's tweet image. Here is my #exploit and blog post for the VMWare Aria Operations for Networks which has CVSS 9.8 and targets all the versions from 6.0 to 6.10 (CVE-2023-34039) Apparently VMware forgot to regenerate their SSH keys 🔐 

summoning.team/blog/vmware-vr…

Ex Android Dev 已转帖

Forget vulnerable drivers - Admin is all you need Article 👉 elastic.co/security-labs/… 👇 Demo - enable sound 🔊


Ex Android Dev 已转帖

Here is PoC for LPE in Windows Error Reporting Service CVE-2023-36874 github.com/Wh04m1001/CVE-…


Ex Android Dev 已转帖

If you need to get information on a GitHub account, You can try GitSint, which allows you to retrieve information on #github through username, email, and organization. github.com/N0rz3/GitSint @norze15 #OSINT #cli #tool #intelligence #infosec #CTI #ThreatIntel #cybersecurity

DailyOsint's tweet image. If you need to get information on a GitHub account,

You can try GitSint, which allows you to retrieve information on #github through username, email, and organization.

github.com/N0rz3/GitSint

@norze15

#OSINT #cli #tool #intelligence #infosec #CTI #ThreatIntel #cybersecurity

Ex Android Dev 已转帖

Big news! Someone finally noticed that if you hold down CTRL, the process list in Task Manager conveniently freezes so you can select rows without them jumping around. I did this so you could sort by CPU and other dynamic columns but then still be able to click stuff...

davepl1968's tweet image. Big news!  Someone finally noticed that if you hold down CTRL, the process list in Task Manager conveniently freezes so you can select rows without them jumping around.

I did this so you could sort by CPU and other dynamic columns but then still be able to click stuff...

Ex Android Dev 已转帖

Phishing emails making use of the "search-ms" URI protocol handler to download malicious payload. trellix.com/en-us/about/ne… ClickOnce APT Group also use these technology. <script> window.location.href = 'search-ms:query=Review&crumb=location: \\\\domain@SSL\…

blackorbird's tweet image. Phishing emails making use of the &quot;search-ms&quot; URI protocol handler to download malicious payload.
trellix.com/en-us/about/ne…
ClickOnce APT Group also use these technology.
&amp;lt;script&amp;gt;
window.location.href = &apos;search-ms:query=Review&amp;amp;crumb=location: \\\\domain@SSL\…
blackorbird's tweet image. Phishing emails making use of the &quot;search-ms&quot; URI protocol handler to download malicious payload.
trellix.com/en-us/about/ne…
ClickOnce APT Group also use these technology.
&amp;lt;script&amp;gt;
window.location.href = &apos;search-ms:query=Review&amp;amp;crumb=location: \\\\domain@SSL\…

Ex Android Dev 已转帖

Good new everyone! MinecraftLauncher.exe is susceptible to DLL sideloading. And YES, it is digitally signed by Mojang. EDRs have no idea what's coming for them😌

AndrewOliveau's tweet image. Good new everyone! MinecraftLauncher.exe is susceptible to DLL sideloading. And YES, it is digitally signed by Mojang. EDRs have no idea what&apos;s coming for them😌

Ex Android Dev 已转帖

🚨 Alert! A new #malware strain called AVrecon has quietly targeted over 70,000 small office/home office (SOHO) routers worldwide, forming a massive botnet of 40,000 nodes across 20 countries. Read: thehackernews.com/2023/07/new-so… #cybersecurity #infosec #informationsecurity


Ex Android Dev 已转帖

🚀Evil QR - Phishing With QR Codes 🪝🐟 Just released some fun research on how to perform phishing with QR codes. Enjoy the blog post and a demo video! I've also published Evil QR toolkit on GH, which you can use to see how the attack works in practice breakdev.org/evilqr-phishin…


Ex Android Dev 已转帖

Just published a new blog post covering how to hide Beacon during BOF execution. If your BOF triggers a memory scan then EDR is likely to find Beacon and kill your process, but we can mask it using a simple technique. securityintelligence.com/posts/how-to-h…


Ex Android Dev 已转帖

Today I'm releasing AtlasReaper, a .NET tool designed for red teamers to interact with Confluence and Jira via C2 agents. Discover secrets and launch targeted attacks. Check out the blogpost for more details: medium.com/@werdhaihai/7a… Github Repo: github.com/werdhaihai/Atl…


Loading...

Something went wrong.


Something went wrong.