Hackers Stole Access Tokens from Okta’s Support Unit https://krebsonsecurity.com/2023/10/hackers-stole-access-tokens-from-oktas-support-unit/
AI Exploits https://github.com/protectai/ai-exploits
Module Stomping - Who up stompin they modules https://dtsec.us/2023-11-04-ModuleStompin/
Introduction to DotNet Configuration Extraction - RevengeRAT https://embee-research.ghost.io/introduction-to-dotnet-configuration-extraction-revengerat/
RecycledInjector - Native Syscalls Shellcode Injector https://www.kitploit.com/2023/10/recycledinjector-native-syscalls.html?m=1
Article 45 Will Roll Back Web Security by 12 Years https://www.eff.org/deeplinks/2023/11/article-45-will-roll-back-web-security-12-years
Attacks on 5G Infrastructure From Users’ Devices https://www.trendmicro.com/en_us/research/23/i/attacks-on-5g-infrastructure-from-users-devices.html
FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool https://github.com/FalconForceTeam/FalconHound
Create Reflective DLL for Cobalt Strike https://sokarepo.github.io/redteam/2023/10/11/create-reflective-dll-for-cobaltstrike.html
NimExec - Fileless Command Execution For Lateral Movement In Nim https://www.kitploit.com/2023/12/nimexec-fileless-command-execution-for.html
Automating String Decryption and Other Reverse Engineering Tasks in radare2 With r2pipe https://www.sentinelone.com/labs/automating-string-decryption-and-other-reverse-engineering-tasks-in-radare2-with-r2pipe/
Automating String Decryption and Other Reverse Engineering Tasks in radare2 With r2pipe https://www.sentinelone.com/labs/automating-string-decryption-and-other-reverse-engineering-tasks-in-radare2-with-r2pipe/
Security Vulnerabilities in CasaOS https://www.sonarsource.com/blog/security-vulnerabilities-in-casaos/
Cobalt Strike 4.5-4.9 Yara Detection https://github.com/paranoidninja/Cobaltstrike-Detection/blob/main/cs49.yara
NahamCon CTF 2023 - Mayhem https://elvisblue.github.io/posts/nahamcon-mayhem-solution/
Reptar: an Intel Ice Lake CPU vulnerability, by Tavis Ormandy https://lock.cmpxchg8b.com/reptar.html
Alert Regarding Vulnerability in Trend Micro Multiple Endpoint Security Products for Enterprises https://www.jpcert.or.jp/english/at/2023/at230021.html
How Hackers Hide From Memory Scanners https://youtu.be/WYuhJzngfVc?si=KYvedCuIOsItE7sc
Setup a Hardware Hacking Lab https://voidstarsec.com/hw-hacking-lab/vss-lab-guide
Python tool and library for decrypting MS Office files with passwords or other keys https://github.com/nolze/msoffcrypto-tool