Web安全
BlindBrute:SQL盲注爆破工具
https://github.com/c3llkn1ght/BlindBrute
内网渗透
组策略安全噩梦,可被攻击者滥用的AD域组策略错误配置
https://decoder.cloud/2024/11/08/group-policy-security-nightmares-pt-1/
Carseat:Seatbelt的python版本实现
https://github.com/0xthirteen/Carseat
终端对抗
GoDroplets:Golang载荷投递器生成框架
https://github.com/almounah/GoDroplets
Exploration C2:图形化Windows平台开源C2框架
https://github.com/maxDcb/C2TeamServer
利用CobaltStrike 4.10中的新对抗特性魔改Beacon
https://rwxstoned.github.io/2024-11-13-Cobalt-Strike-customization/
滥用Microsoft Dev Tunnels进行C2通讯与隐蔽持久化
https://newtonpaul.com/tunneling-c2-through-microsoft-dev-tunnels/
ShadowDumper:集成系统调用等多种对抗技术的Lsass转储工具
https://github.com/Offensive-Panda/ShadowDumper
攻击者借助QEMU模拟的轻量级自定义Linux环境实现持久化
https://www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-latest-tactic-in-malware-staging/
RedLine商业窃密器分析揭秘
https://www.welivesecurity.com/en/eset-research/life-crooked-redline-analyzing-infamous-infostealers-backend/
漏洞相关
Exploit-Street:近两年Windows本地提权漏洞EXP合集
https://github.com/MzHmO/Exploit-Street
CVE-2024-43451:NTLMv2哈希泄露在野0day漏洞分析
https://github.com/blackorbird/APT_REPORT/blob/master/Exploit/Zero-day-cve-2024-4351-report.pdf
https://www.clearskysec.com/0d-vulnerability-exploited-in-the_wild/
Amd处理器Sinkclose漏洞POC发布
https://github.com/IOActive/Platbox/blob/main/pocs/AmdSinkclose/sinkclose.cpp
CVE-2024-47575:FortiManager 0day漏洞分析
https://attackerkb.com/topics/OFBGprmpIE/cve-2024-47575/rapid7-analysis
CVE-2024-9680:Firefox动画时间线组件UAF RCE漏洞分析
https://dimitrifourny.github.io/2024/11/14/firefox-animation-cve-2024-9680.html
Critx Virtual Apps And Desktops .NET反序列化漏洞
https://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/
云安全
Google Cloud Composer存储桶从写入权限到任意命令执行
https://www.netspi.com/blog/technical-blog/cloud-pentesting/privilege-escalation-google-cloud-composer/
对 GitHub Actions 执行安全扫描的 GitHub Action
https://github.com/synacktiv/action-octoscan
人工智能和安全
SECSOSO:LLM驱动的网络安全内容聚合搜索
https://secsoso.com
实现自动渗透测试:引入LLM渗透基准测试、分析和改进
https://arxiv.org/pdf/2410.17141
ModeLeak:Google Vertex AI 中LLM模型渗透的权限升级
https://unit42.paloaltonetworks.com/privilege-escalation-llm-model-exfil-vertex-ai/
其他
ETW日志结构分析与内存取证
https://blogs.jpcert.or.jp/en/2024/11/etw_forensics.html
BlueHat 2024:检测Intune内横向移动
https://www.youtube.com/watch?v=JKgMJMHO34Q
M01N Team公众号
聚焦高级攻防对抗热点技术
绿盟科技蓝军技术研究战队
官方攻防交流群
网络安全一手资讯
攻防技术答疑解惑
扫码加好友即可拉群
往期推荐