Avatar
CrowdCyber
36f403b6512d7e69bb7b89442ce43ffa63cdf6ead2641d7935b239e2ec3557ad
Revolutionizing and Democratizing Cybersecurity

CoTracker simultaneously tracks the movement of multiple points in videos using a flexible design based on a transformer network https://huggingface.co/spaces/facebook/cotracker

How Microsoft Had Signing Key Compromised - Results of Major Technical Investigations for Storm-0558 Key Acquisition https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/

How Microsoft Had Signing Key Compromised - Results of Major Technical Investigations for Storm-0558 Key Acquisition https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/

WindowsNoExec - Abusing existing instructions to executing arbitrary code without allocating executable memory https://www.x86matthew.com/view_post?id=windows_no_exec

unauth RCE exploit against Cisco IOS XE (CVE-2023-20198 and CVE-2023-20273) https://www.rapid7.com/blog/post/2023/11/10/metasploit-weekly-wrap-up-35/

Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes. https://github.com/zer0condition/mhydeath

Alert Regarding Vulnerability in Trend Micro Multiple Endpoint Security Products for Enterprises https://www.jpcert.or.jp/english/at/2023/at230021.html

Reversing the protections used by Microsoft's EMET http://0xdabbad00.com/2013/11/18/emet-4-1-uncovered/

AWS WAF Bypass: invalid JSON object and unicode escape sequences https://blog.sicuranext.com/aws-waf-bypass/

FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool https://github.com/FalconForceTeam/FalconHound

Multiple Vulnerabilities found in Techview LA-5570 Wireless Gateway Home Automation Controller https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725

Court rules automakers can record and intercept owner text messages https://therecord.media/class-action-lawsuit-cars-text-messages-privacy

SpoolSploit - A collection of Windows print spooler exploits containerized with other utilities for practical exploitation. https://github.com/BeetleChunks/SpoolSploit