ExAndroidDev's profile picture. Ex android developer, pentester, red teaming enthusiast

Ex Android Dev

@ExAndroidDev

Ex android developer, pentester, red teaming enthusiast

Ex Android Dev 님이 재게시함

🚨 If you haven’t tested your Microsoft 365 environment like an APT, the time is now! Introducing msInvader, an adversary simulation tool designed to emulate attack techniques within M365 and Azure environments. 🔑 Key Features: •Versatile Authentication Simulation: 🔄 Supports…


Ex Android Dev 님이 재게시함

At #Pwn2Own Ireland, our team successfully exploited vulnerabilities in the Lorex 2K Indoor WiFi Camera. Check out our blog for the full technical breakdown: blog.infosectcbr.com.au/2024/12/exploi…


Ex Android Dev 님이 재게시함

Today James Forshaw (@tiraniddo) did a quick assessment on the new Windows 11 Sudo.exe. Despite his quick assessment, the blog post is wonderful. It is an excellent read. We recommend it:) tl;dr fancier ShellExecute 😭 tiraniddo.dev/2024/02/sudo-o…


Ex Android Dev 님이 재게시함

Do you want to start the RemoteRegistry service without Admin privileges? Just write into the "winreg" named pipe 👇

splinter_code's tweet image. Do you want to start the RemoteRegistry service without Admin privileges?
Just write into the "winreg" named pipe 👇

Ex Android Dev 님이 재게시함

🚨 Beware, Mac users! MetaStealer, a new info-stealer #malware, is targeting #macOS. Learn how it's posing as prospective clients to trick victims into launching malicious payloads. Learn more: thehackernews.com/2023/09/beware… #cybersecurity #hacking


Ex Android Dev 님이 재게시함

In our latest post, @breakfix details how we were able to publish a malicious VSCode extension to the marketplace and leverage it for initial access during a red team mdsec.co.uk/2023/08/levera… vimeo.com/853281700?shar…

MDSecLabs's tweet card. Phishing with Visual Studio Code

vimeo.com

Vimeo

Phishing with Visual Studio Code


Ex Android Dev 님이 재게시함

Here is my #exploit and blog post for the VMWare Aria Operations for Networks which has CVSS 9.8 and targets all the versions from 6.0 to 6.10 (CVE-2023-34039) Apparently VMware forgot to regenerate their SSH keys 🔐 summoning.team/blog/vmware-vr…

SinSinology's tweet image. Here is my #exploit and blog post for the VMWare Aria Operations for Networks which has CVSS 9.8 and targets all the versions from 6.0 to 6.10 (CVE-2023-34039) Apparently VMware forgot to regenerate their SSH keys 🔐 

summoning.team/blog/vmware-vr…

Ex Android Dev 님이 재게시함

Forget vulnerable drivers - Admin is all you need Article 👉 elastic.co/security-labs/… 👇 Demo - enable sound 🔊


Ex Android Dev 님이 재게시함

Here is PoC for LPE in Windows Error Reporting Service CVE-2023-36874 github.com/Wh04m1001/CVE-…


Ex Android Dev 님이 재게시함

If you need to get information on a GitHub account, You can try GitSint, which allows you to retrieve information on #github through username, email, and organization. github.com/N0rz3/GitSint @norze15 #OSINT #cli #tool #intelligence #infosec #CTI #ThreatIntel #cybersecurity

DailyOsint's tweet image. If you need to get information on a GitHub account,

You can try GitSint, which allows you to retrieve information on #github through username, email, and organization.

github.com/N0rz3/GitSint

@norze15

#OSINT #cli #tool #intelligence #infosec #CTI #ThreatIntel #cybersecurity

Ex Android Dev 님이 재게시함

Big news! Someone finally noticed that if you hold down CTRL, the process list in Task Manager conveniently freezes so you can select rows without them jumping around. I did this so you could sort by CPU and other dynamic columns but then still be able to click stuff...

davepl1968's tweet image. Big news!  Someone finally noticed that if you hold down CTRL, the process list in Task Manager conveniently freezes so you can select rows without them jumping around.

I did this so you could sort by CPU and other dynamic columns but then still be able to click stuff...

Ex Android Dev 님이 재게시함

Phishing emails making use of the "search-ms" URI protocol handler to download malicious payload. trellix.com/en-us/about/ne… ClickOnce APT Group also use these technology. <script> window.location.href = 'search-ms:query=Review&crumb=location: \\\\domain@SSL\…

blackorbird's tweet image. Phishing emails making use of the &quot;search-ms&quot; URI protocol handler to download malicious payload.
trellix.com/en-us/about/ne…
ClickOnce APT Group also use these technology.
&amp;lt;script&amp;gt;
window.location.href = &apos;search-ms:query=Review&amp;amp;crumb=location: \\\\domain@SSL\…
blackorbird's tweet image. Phishing emails making use of the &quot;search-ms&quot; URI protocol handler to download malicious payload.
trellix.com/en-us/about/ne…
ClickOnce APT Group also use these technology.
&amp;lt;script&amp;gt;
window.location.href = &apos;search-ms:query=Review&amp;amp;crumb=location: \\\\domain@SSL\…

Ex Android Dev 님이 재게시함

Good new everyone! MinecraftLauncher.exe is susceptible to DLL sideloading. And YES, it is digitally signed by Mojang. EDRs have no idea what's coming for them😌

AndrewOliveau's tweet image. Good new everyone! MinecraftLauncher.exe is susceptible to DLL sideloading. And YES, it is digitally signed by Mojang. EDRs have no idea what&apos;s coming for them😌

Ex Android Dev 님이 재게시함

🚨 Alert! A new #malware strain called AVrecon has quietly targeted over 70,000 small office/home office (SOHO) routers worldwide, forming a massive botnet of 40,000 nodes across 20 countries. Read: thehackernews.com/2023/07/new-so… #cybersecurity #infosec #informationsecurity


Ex Android Dev 님이 재게시함

🚀Evil QR - Phishing With QR Codes 🪝🐟 Just released some fun research on how to perform phishing with QR codes. Enjoy the blog post and a demo video! I've also published Evil QR toolkit on GH, which you can use to see how the attack works in practice breakdev.org/evilqr-phishin…


Ex Android Dev 님이 재게시함

Just published a new blog post covering how to hide Beacon during BOF execution. If your BOF triggers a memory scan then EDR is likely to find Beacon and kill your process, but we can mask it using a simple technique. securityintelligence.com/posts/how-to-h…


Ex Android Dev 님이 재게시함

Today I'm releasing AtlasReaper, a .NET tool designed for red teamers to interact with Confluence and Jira via C2 agents. Discover secrets and launch targeted attacks. Check out the blogpost for more details: medium.com/@werdhaihai/7a… Github Repo: github.com/werdhaihai/Atl…


Loading...

Something went wrong.


Something went wrong.