漏洞相关
1、
红队技术
1、Nemesis 2.0: Automated File Analysis during Offensive Engagements
https://www.youtube.com/watch?v=5P9N1OQTUqM
2、Automating MS-RPC vulnerability research
https://www.incendium.rocks/posts/Automating-MS-RPC-Vulnerability-Research/
3、FileFix - A ClickFix Alternative
https://mrd0x.com/filefix-clickfix-alternative/
4、Mythic C2 with EarlyBird Injection and Defender Evasion
https://xbz0n.sh/blog/mythic-c2-early-bird-defender-evasion
5、Primitive Injection - Breaking the Status Quo
https://trickster0.github.io/posts/Primitive-Injection/
6、Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound
https://specterops.io/blog/2025/06/25/good-fences-make-good-neighbors-new-ad-trusts-attack-paths-in-bloodhound/
7、记一次成功的ollvm-fla简单魔改尝试
8、蓝队的噩梦,让PE保持隐形
9、Hijack Windows MareBackup 计划任务实现本地提权分析
10、Doppelganger: An Advanced LSASS Dumper with Process Cloning
https://labs.yarix.com/2025/06/doppelganger-an-advanced-lsass-dumper-with-process-cloning/
11、五种 EXE 处理方式,突破静态查杀
12、Recutting the Kerberos Diamond Ticket
https://www.huntress.com/blog/recutting-the-kerberos-diamond-ticket
13、Beacon Object Files – Five Years On…
https://aff-wg.org/2025/06/26/beacon-object-files-five-years-on/
14、PatchGuard Internals
https://r0keb.github.io/posts/PatchGuard-Internals/
15、We’re going the wrong way! How to abuse symlinks and get LPE in Windows
https://cicada-8.medium.com/were-going-the-wrong-way-how-to-abuse-symlinks-and-get-lpe-in-windows-0c598b99125b
16、突破网络限制,Merlin Agent助你轻松搭建跳板网络!
https://xz.aliyun.com/news/18329
17、从SRDI原理剖析再到PE2Shellcode的实现
https://xz.aliyun.com/news/18239
18、无WriteProcessMemory CreateRemoteThread实现shellcode注入 GhostWriting x64实现
https://xz.aliyun.com/news/18237
19、Understanding Kerberos for Security Professionals (Part 1)
https://medium.com/@cyberpro151/understanding-kerberos-for-security-professionals-part-1-0fce109a6bf4
20、Evading Windows Security : Bypass AMSI
https://medium.com/@R3dLevy/evading-windows-security-bypass-amsi-65d639e2f35d
21、How to use Mimikatz for Hacking in 2025: The Definitive Guide
https://www.stationx.net/how-to-use-mimikatz/
蓝队技术
1、🔧 PsExec in Red Teaming: Tactics, Detection, Evasion & Alternatives
https://osintteam.blog/psexec-in-red-teaming-tactics-detection-evasion-alternatives-b170508f4fd6
2、SentinelOne Threat Hunting Series P1: Must-Have Custom Detection Rules
https://medium.com/@cyberengage.org/sentinelone-threat-hunting-series-p1-must-have-custom-detection-rules-d09267528a1a
3、CrowdStrike Researchers Investigate the Threat of Patchless AMSI Bypass Attacks
https://www.crowdstrike.com/en-us/blog/crowdstrike-investigates-threat-of-patchless-amsi-bypass-attacks/
工具类
1、windows_kernel_shadow_stack
https://github.com/synacktiv/windows_kernel_shadow_stack
Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.
2、Upload_Super_Fuzz_Gui
https://github.com/7797777977/Upload_Super_Fuzz_Gui
3、hypnus
https://github.com/joaoviictorti/hypnus
Memory Obfuscation in Rust
4、wsuks
https://github.com/NeffIsBack/wsuks
Automating the MITM attack on WSUS
5、Byont - Bring Your Own NTDLL
https://github.com/Teach2Breach/byont
6、NT(dll) Unhooker
https://github.com/Teach2Breach/nt_unhooker
7、BitlockMove
https://github.com/rtecCyberSec/BitlockMove
Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking
8、Alphabetfuscation: Convert your shellcode into an ASCII string
https://github.com/Maldev-Academy/Alphabetfuscation
其他类
1、
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...