Preface

What is this and why does it exist?

All links, the content behind and the opinions there are not mine.
If you follow an external link, it is your problem, not mine if you do not like, what you find there.
Please be aware, that this is just a list of topics I find interesting.

All mentioned security tools can be found here: https://github.com/MrMarco74/security-geraffel



Tools

PrivacyFox tweaks various preferences in Firefox in order to enhance the privacy of users; it will also try to enforce these changes to maintain your privacy online
–> PrivacyFox - github <–

Advanced Indicator of Compromise (IOC) extractor
–> python-iocextract - github <–

Intel Management Engine JTAG Proof of Concept
–> IntelTXE-PoC - github <–

A front-end JavaScript toolkit for creating DNS rebinding attacks
–> dns-rebind-toolkit - github <–

This is a PoC script for various methods to acheive authenticated remote code execution via WMI, without (at least directly) using the Win32_Process class
–> Invoke-WMILM - github <–

Decipher hashes using online rainbow & lookup table attack services
–> dcipher - github <–

A small Windows script that downloads the latest MaxMind GeoIP databases and puts them into a folder called “GeoIP” in your Wireshark user settings directory
–> GeoIPDBUpdate - github <–

Kali Linux 2018.3 Release
–> Kali Linux 2018-3 - Kali Linux <–

Huge collection of pentest/vuln/whatever tools
–> Misc - GitHackTools <–




Talks & Knowledge

15 Ways to Bypass the PowerShell Execution Policy
–> PowerShell Execution Policy Bypass - NetSPI Blog <–

Windows oneliners to download remote payload and execute arbitrary code
–> oneline downloader - arno0x0x <–

Remote NTLM relaying through meterpreter on Windows port 445
–> Remote NTLM relaying - diablohorn <–

The manual installation link for @kalilinux for WSL is now live! You can use this to script your installs
–> WSL KaliLinux Setup - Microsoft Docs <–

Reflective DLL Injection
–> Reflective DLL Injection - 0x00sec <–

Side-Channel Attack Allows Remote Listener to ‘Hear’ On-Screen Images
–> Side-Channel Attack - ThreatPost <–

Antivirus Evasion for Penetration Testing Engagements
–> AV Evasion for Pentests - AlienVault <–

Crypton - Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms
–> Crypton - KitPloit <–



Threats

OpenSSH CVE-2018-15473 User Enumeration Vulnerability - Exploit written in Python for CVE-2018-15473 with threading and export formats
–> CVE-2018-15473 - github <–

Click me if you can, Office social engineering with embedded objects
–> Office Vuln - Securify <–

Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the ALPC interface
–> PrivEsc in ALPC Interface in Windows - CERT <–

Critical Apache Struts Vulnerability Exploited in Live Attacks
–> CVE-2018-11776 - SecurityWeek <–

AT Command Hitch Leaves Android Phones Open to Attack
–> AT Command on Android Phones - ThreatPost <–