Resources

Google searchs to find interesting information (should limit the results time to last 24 hours or last month to find recent stuff):

  1. inurl:github rootkit
  2. inurl:github backdoor
  3. inurl:github inject
  4. inurl:github exploit
  5. exploit framework -xenotix -beef -metasploit
  6. github exploit kit
  7. site:https://github.com bruteforce
  8. site:https://github.com vulnerability
  9. site:https://github.com exploit

Tools lists:

  1. https://www.thc.org/root/tools/
  2. https://www.thc.org/releases.php
  3. https://github.com/byt3bl33d3r
  4. https://github.com/BlackArch/blackarch-site/blob/master/data/tools
  5. Android Penetration Testing 40+ Tools 2015
    https://gist.github.com/CHEF-KOCH/b57798cbed21762eaff6

Interesting blogs and github users:

  1. http://watchguardsecuritycenter.com/
    1. It also got a collection of info about microsoft vulnerabilities http://watchguardsecuritycenter.com/tag/word/
  2. https://github.com/Rootkitsmm/
    1. Fuzz and Detect “Use After Free” vulnerability in win32k.sys https://github.com/Rootkitsmm/Win32k-Fuzzer
    2. Windows kernel vulnerability in win32k.sys Driver https://github.com/Rootkitsmm/CVEXX-XX
    3. Exploiting MS15-061 with reverse engineering Win32k.sys
      https://github.com/Rootkitsmm/MS15-061
    4. Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )
      https://github.com/Rootkitsmm/Win10Pcap-Exploit
    5. Pool Overflow in OpenVpn NDIS TAP Driver
      https://github.com/Rootkitsmm/OpenVpn-Pool-Overflow
    6. Double IoDereferenceObject call Bug in UnThreat AV Driver
      https://github.com/Rootkitsmm/UnThreatAVDriver-DOS
    7. implementation of some concepts in Security and Exploiting
      https://github.com/Rootkitsmm/miscellaneous
    8. vulnerable NDIS Driver – Remote Crash OS with scapy
      https://github.com/Rootkitsmm/NDIS-Exploit (seems empty but sounds interesting)
    9. Anti-AV compilation
      https://github.com/Rootkitsmm/AbsoluteZero
    10. exploits – Bypass_SMEP_DEP, driver_leak.c, superfetch_leak.c, win32k_gsharedinfo_leak.c, MS10-058.cpp, MS14-040.cpp
      https://github.com/Rootkitsmm/Exploits
  3. https://github.com/ITh4cker/google-security-research/issues samsung galaxy vulnerabilities

Information and tools collections:

  1. Collection and compariso of different public VPNs:
    1. https://docs.google.com/spreadsheets/u/1/d/1FJTvWT5RHFSYuEoFVpAeQjuQPU4BVzbOigT0xebxTOw/htmlview?usp=sharing&sle=true
  2. Collection of hacking tools and docs:
    1. https://www.thc.org/root/
  3. Collection of application security articles:
    1. http://resources.infosecinstitute.com/category/application-security-2/
  4. Collection of penetration testing tools and information:
    1. http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html
  5. List of 100+ all kinds of honeypots:
    1. https://github.com/paralax/awesome-honeypots/blob/master/README.md
  6. List of 50+ cool IDA plugins which include: Collection of Android reverse engineering scripts, IDA scripts and tools to assist with reverse engineering EFI executables, Scripting IDA with C#, plugin that enables you to remove some common obfuscations, etc
    1. https://github.com/onethawt/idaplugins-list
  7. A curated list of 100+ awesome malware analysis tools and resources
    1. https://github.com/rshipp/awesome-malware-analysis/blob/master/README.md
  8. Secure Mobile Development – A collection of best practices
    1. https://github.com/nowsecure/secure-mobile-development

Interesting Articles:

  1. How to set up penetration testing lab
    1. http://bhargavtandel.com/?p=511
  2. Statistics of which technologies and tools pentesters prefer to use
    1. http://blog.ctf365.com/infographic-your-pentest-tools-arsenal/
  3. Hardware side channels in the cloud
    1. http://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/
  4. The good and bad of Intel SGX
    1. https://www.virusbtn.com/virusbulletin/archive/2014/01/vb201401-SGX
  5. Exploiting heap overflow and bypassing DEP without heap spray
    1. http://dvlabs.tippingpoint.com/blog/2012/03/15/pwn2own-2012-challenge-writeup
    2. Uses WriteProcessMemory technique to bypass DEP http://seclists.org/fulldisclosure/2010/Mar/att-553/Windows-DEP-WPM.txt
  6. A collection of articles called “SMBRelay bible” which explains and demonstrates various smb relay techniques
    1. http://erpscan.com/press-center/blog/new-blog-section-smbrelay-bible/
    2. http://erpscan.com/press-center/blog/smbrelay-bible-1-attacking-enterprise-business-erp/
    3. http://erpscan.com/press-center/blog/smbrelay-bible-2-smbrelay-by-ms-sql-server/
    4. http://erpscan.com/press-center/blog/smbrelay-bible-3-smbrelay-by-oracle/
    5. http://erpscan.com/press-center/blog/smbrelay-bible-4-smbrelay-with-no-action-or-attacking-security-software-kaspersky-avsymantec-dlp-gfi-languard-0-days/
    6. http://erpscan.com/press-center/blog/smbrelay-bible-5-smbrelay-attacks-on-corporate-users/
    7. http://erpscan.com/press-center/blog/smbrelay-bible-6-smbrelay-attacks-on-corporate-users-part-2/
    8. http://erpscan.com/press-center/blog/smbrelay-bible-7-ssrf-java-windows-love/

Others:

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s