Merge PR #5806 from @nasbench - Archive New Rule References
chore: archive new rule references and update cache file --------- Co-authored-by: nasbench <nasbench@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
685194383b
commit
6d581764e7
+592
-513
@@ -1,540 +1,619 @@
|
||||
# Reference Archiver Results
|
||||
|
||||
Last Execution: 2025-11-01 02:14:59
|
||||
Last Execution: 2025-12-15 02:17:00
|
||||
|
||||
### Archiver Script Results
|
||||
|
||||
|
||||
#### Newly Archived References
|
||||
|
||||
- https://labs.watchtowr.com/guess-who-would-be-stupid-enough-to-rob-the-same-vault-twice-pre-auth-rce-chains-in-commvault/
|
||||
- https://web.archive.org/web/20190710034152/https://github.com/zerosum0x0/CVE-2019-0708
|
||||
- https://web.archive.org/web/20230217071802/https://blooteem.com/march-2022
|
||||
|
||||
#### Already Archived References
|
||||
|
||||
- https://docs.aws.amazon.com/IAM/latest/APIReference/API_DeleteSAMLProvider.html
|
||||
- https://blog.talosintelligence.com/uat-5647-romcom/
|
||||
- https://trustedsec.com/blog/wmi-for-script-kiddies
|
||||
- https://www.virustotal.com/gui/file/fdc86a5b3d7df37a72c3272836f743747c47bfbc538f05af9ecf78547fa2e789/behavior
|
||||
- https://tria.ge/240226-fhbe7sdc39/behavioral1
|
||||
- https://linux-audit.com/systemd/faq/what-is-the-difference-between-systemctl-disable-and-systemctl-mask/
|
||||
- https://objective-see.org/blog/blog_0x6D.html
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#short-lived-accounts
|
||||
- https://medium.com/system-weakness/detecting-as-rep-roasting-attacks-b5b3965f9714
|
||||
- https://x.com/cyb3rops/status/1862406110365245506
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.windows.servermanager.migration/uninstall-windowsfeature
|
||||
- https://www.anyviewer.com/help/remote-technical-support.html
|
||||
- https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-6423
|
||||
- https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_suspend-disable.html
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1490/T1490.md#atomic-test-12---disable-time-machine
|
||||
- https://docs.oracle.com/cd/E19683-01/816-4883/6mb2joatd/index.html
|
||||
- https://github.com/joaoviictorti/RustRedOps/tree/ce04369a246006d399e8c61d9fe0e6b34f988a49/Self_Deletion
|
||||
- https://www.elastic.co/security-labs/grimresource
|
||||
- https://twitter.com/standa_t/status/1808868985678803222
|
||||
- https://www.bitdefender.com/en-us/blog/businessinsights/shrinklocker-decryptor-from-friend-to-foe-and-back-again
|
||||
- https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing
|
||||
- https://docs.github.com/en/repositories/archiving-a-github-repository/archiving-repositories
|
||||
- https://man7.org/linux/man-pages/man2/mknod.2.html
|
||||
|
||||
#### Error While Archiving References
|
||||
|
||||
- https://www.hexacorn.com/blog/2019/02/15/beyond-good-ol-run-key-part-103/
|
||||
- https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
|
||||
- https://www.hexacorn.com/blog/2018/08/31/beyond-good-ol-run-key-part-85/
|
||||
- https://www.aon.com/cyber-solutions/aon_cyber_labs/linux-based-inter-process-code-injection-without-ptrace2/
|
||||
- https://thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html
|
||||
- https://www.group-ib.com/resources/threat-research/red-curl-2.html
|
||||
- http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
|
||||
- https://megatools.megous.com/
|
||||
- https://man7.org/linux/man-pages/man1/dmesg.1.html
|
||||
- https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/
|
||||
- https://web.archive.org/web/20230329163438/https://blog.menasec.net/2019/02/threat-hunting-5-detecting-enumeration.html
|
||||
- https://web.archive.org/web/20200601000524/https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/
|
||||
- https://docs.github.com/en/repositories/creating-and-managing-repositories/transferring-a-repository
|
||||
- https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195
|
||||
- https://blu.org/mhonarc/discuss/2001/04/msg00285.php
|
||||
- https://learn.microsoft.com/en-us/sql/t-sql/statements/drop-database-transact-sql?view=sql-server-ver16
|
||||
- https://www.zscaler.com/blogs/security-research/deepseek-lure-using-captchas-spread-malware
|
||||
- https://www.hexacorn.com/blog/2024/01/06/1-little-known-secret-of-fondue-exe/
|
||||
- https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise#migration
|
||||
- https://github.com/joaoviictorti/RustRedOps/tree/ce04369a246006d399e8c61d9fe0e6b34f988a49/Self_Deletion
|
||||
- https://web.archive.org/web/20230929023836/http://powershellhelp.space/commands/set-netfirewallrule-psv5.php
|
||||
- https://ss64.com/osx/sw_vers.html
|
||||
- https://mp.weixin.qq.com/s/wUoBy7ZiqJL2CUOMC-8Wdg
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/75fa21076dcefa348a7521403cdd6bfc4e88623c/atomics/T1124/T1124.md
|
||||
- https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc#rds-modifydbinstance
|
||||
- https://blogs.blackberry.com/en/2024/07/akira-ransomware-targets-the-latam-airline-industry
|
||||
- https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-infrastructure
|
||||
- https://www.trendmicro.com/en_us/research/24/j/edrsilencer-disrupting-endpoint-security-solutions.html
|
||||
- https://github.com/rtecCyberSec/SpeechRuntimeMove
|
||||
- https://unit42.paloaltonetworks.com/chromeloader-malware/
|
||||
- https://globetech.biz/index.php/2023/05/19/evading-edr-by-dll-sideloading-in-csharp/
|
||||
- https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf
|
||||
- https://www.huntress.com/blog/know-thy-enemy-a-novel-november-case-on-persistent-remote-access
|
||||
- https://github.com/pr0xylife/Pikabot/blob/fc58126127adf0f65e78f4eec59675523f48f086/Pikabot_22.12.2023.txt
|
||||
- https://www.fortiguard.com/psirt/FG-IR-22-398
|
||||
- https://unicornofhunt.com/2025/05/22/When-Unicorns-Go-Quiet-BITS-Jobs-and-the-Art-of-Stealthy-Transfers/
|
||||
- https://cardinalops.com/blog/living-off-winrm-abusing-complexity-in-remote-management/
|
||||
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/ec2/delete-flow-logs.html
|
||||
- https://www.hexacorn.com/blog/2023/12/26/1-little-known-secret-of-runonce-exe-32-bit/
|
||||
- https://learn.microsoft.com/en-us/troubleshoot/windows-client/installing-updates-features-roles/system-registry-no-backed-up-regback-folder
|
||||
- https://www.microsoft.com/en-us/security/blog/2022/12/12/iis-modules-the-evolution-of-web-shells-and-how-to-detect-them/
|
||||
- https://github.com/splunk/security_content/blob/7283ba3723551f46b69dfeb23a63b358afb2cb0e/lookups/browser_app_list.csv?plain=1
|
||||
- https://winaero.com/how-to-delete-scan-with-windows-defender-from-context-menu-in-windows-10/
|
||||
- https://twitter.com/standa_t/status/1808868985678803222
|
||||
- http://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
|
||||
- https://web.archive.org/web/20190710034152/https://github.com/zerosum0x0/CVE-2019-0708
|
||||
- https://learn.microsoft.com/en-us/sql/tools/sqlps-utility?view=sql-server-ver15
|
||||
- https://research.checkpoint.com/2025/stealth-falcon-zero-day/
|
||||
- https://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin
|
||||
- https://learn.microsoft.com/en-us/windows/win32/shell/shell-and-managed-code
|
||||
- https://web.archive.org/web/20160727113019/https://answers.microsoft.com/en-us/protect/forum/mse-protect_scanning/microsoft-antimalware-has-removed-history-of/f15af6c9-01a9-4065-8c6c-3f2bdc7de45e
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#non-compliant-device-sign-in
|
||||
- https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics
|
||||
- https://www.splunk.com/en_us/blog/security/threat-update-awfulshred-script-wiper.html
|
||||
- https://docs.github.com/en/repositories/archiving-a-github-repository/archiving-repositories
|
||||
- https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC
|
||||
- https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/systeminfo
|
||||
- https://intel.thedfirreport.com/eventReports/view/57
|
||||
- https://kubernetes.io/docs/reference/config-api/apiserver-audit.v1/
|
||||
- https://www.virustotal.com/gui/search/behaviour_processes%253A%2522C%253A%255C%255CWindows%255C%255CSysWOW64%255C%255Cmore.com%2522%2520behaviour_processes%253A%2522C%253A%255C%255CWindows%255C%255CMicrosoft.NET%255C%255CFramework%255C%255Cv4.0.30319%255C%255Cvbc.exe%2522/files
|
||||
- https://www.loobins.io/binaries/xattr/
|
||||
- https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/reagentc-command-line-options?view=windows-11
|
||||
- https://www.man7.org/linux/man-pages/man1/systemctl.1.html
|
||||
- https://vmois.dev/query-signal-desktop-messages-sqlite/
|
||||
- https://gtfobins.github.io/gtfobins/gawk/#shell
|
||||
- https://asec.ahnlab.com/en/40263/
|
||||
- https://www.youtube.com/watch?v=52tAmVLg1KM&t=2070s
|
||||
- https://www.sentinelone.com/blog/from-the-front-linesunsigned-macos-orat-malware-gambles-for-the-win/
|
||||
- https://github.com/kh4sh3i/CVE-2025-32463/blob/81bb430f84fa2089224733c3ed4bfa434c197ad4/exploit.sh
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#bitlocker-key-retrieval
|
||||
- https://www.unicode.org/versions/Unicode5.2.0/ch02.pdf
|
||||
- https://www.cyberciti.biz/faq/linux-remove-user-command/
|
||||
- https://vipre.com/blog/svg-phishing-attacks-the-new-trick-in-the-cybercriminals-playbook/
|
||||
- https://github.com/TwoSevenOneT/EDR-Freeze/blob/a7f61030b36fbde89871f393488f7075d2aa89f6/EDR-Freeze.cpp#L53
|
||||
- https://github.com/grayhatkiller/SharpExShell
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.security/get-acl?view=powershell-7.4
|
||||
- https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/
|
||||
- https://redfoxsec.com/blog/ipv6-dns-takeover/
|
||||
- https://research.splunk.com/endpoint/76406a0f-f5e0-4167-8e1f-337fdc0f1b0c/
|
||||
- https://hopeness.medium.com/master-the-linux-mknod-command-a-comprehensive-guide-1c150a546aa8
|
||||
- https://www.zscaler.fr/blogs/security-research/threat-actors-exploit-cve-2017-11882-deliver-agent-tesla
|
||||
- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
|
||||
- https://www.bleepingcomputer.com/news/security/centrestack-rce-exploited-as-zero-day-to-breach-file-sharing-servers/
|
||||
- https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/push-protection-for-repositories-and-organizations
|
||||
- https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/
|
||||
- https://threatbook.io/blog/Analysis-of-APT-C-60-Attack-on-South-Korea
|
||||
- https://github.com/wietze/HijackLibs/tree/dc9c9f2f94e6872051dab58fbafb043fdd8b4176/yml/3rd_party/python
|
||||
- https://www.nextron-systems.com/2024/03/22/unveiling-kamikakabot-malware-analysis/
|
||||
- https://www.safetycli.com/blog/shai-hulud-npm-attack-runs-malicious-github-action
|
||||
- https://github.com/netero1010/EDRSilencer/blob/0e73a7037ec65c52894d8208e6f605a7da0a34a6/EDRSilencer.c
|
||||
- https://docs.github.com/en/pages/getting-started-with-github-pages/creating-a-github-pages-site
|
||||
- https://github.com/clearvector/lambda-spy
|
||||
- https://docs.microsoft.com/en-us/sql/tools/bcp-utility
|
||||
- https://www.sentinelone.com/labs/ranzy-ransomware-better-encryption-among-new-features-of-thunderx-derivative/
|
||||
- https://strontic.github.io/xcyclopedia/library/vbc.exe-A731372E6F6978CE25617AE01B143351.html
|
||||
- https://www.atomicredteam.io/atomic-red-team/atomics/T1048.003#atomic-test-8---python3-httpserver
|
||||
- https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild/
|
||||
- https://github.com/rapid7/metasploit-framework/issues/11337
|
||||
- https://www.hexacorn.com/blog/2020/08/23/odbcconf-lolbin-trifecta/
|
||||
- https://www.dsinternals.com/en/dpapi-backup-key-theft-auditing/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4776
|
||||
- https://paper.seebug.org/1495/
|
||||
- https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/
|
||||
- https://www.virustotal.com/gui/file/6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b
|
||||
- https://www.trendmicro.com/content/dam/trendmicro/global/en/research/24/b/lockbit-attempts-to-stay-afloat-with-a-new-version/technical-appendix-lockbit-ng-dev-analysis.pdf
|
||||
- https://tria.ge/231023-lpw85she57/behavioral2
|
||||
- https://www.linkedin.com/posts/mauricefielenbach_sharepoint-incidentresponse-windowssecurity-activity-7352653907363303425-bL2f
|
||||
- https://www.bleepingcomputer.com/news/security/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/
|
||||
- https://learn.microsoft.com/en-us/dotnet/api/system.directoryservices.accountmanagement?view=net-8.0
|
||||
- https://viz.greynoise.io/tags/hello-world-scraper-botnet?days=30
|
||||
- https://tria.ge/240731-jh4crsycnb/behavioral2
|
||||
- https://www.huntress.com/blog/attacking-mssql-servers-pt-ii
|
||||
- https://www.greynoise.io/blog/new-scraper-botnet-concentrated-in-taiwan
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-5038
|
||||
- https://man7.org/linux/man-pages/man2/sysinfo.2.html
|
||||
- https://www.sans.org/blog/protecting-privileged-domain-accounts-lm-hashes-the-good-the-bad-and-the-ugly/
|
||||
- https://www.securityhq.com/blog/malicious-isatap-tunneling-unearthed-on-windows-server/
|
||||
- https://x.com/0x534c/status/1944694507787710685
|
||||
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
|
||||
- https://medium.com/@poudelswachchhanda123/preventing-lnk-and-fakecaptcha-threats-a-system-hardening-approach-2f7b7ed2e493
|
||||
- https://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd299871(v=ws.10)
|
||||
- https://docs.python.org/3/library/http.server.html
|
||||
- https://github.com/CheraghiMilad/bypass-Neo23x0-auditd-config/blob/f1c478a37911a5447d5ffcd580f22b167bf3df14/sysinfo-syscall/README.md
|
||||
- https://www.jamf.com/blog/infostealers-pose-threat-to-macos/
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_arithmetic_operators?view=powershell-5.1
|
||||
- https://x.com/Max_Mal_/status/1826179497084739829
|
||||
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::SecurityPage_AutoDetect
|
||||
- https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/?123
|
||||
- https://github.com/CheraghiMilad/bypass-Neo23x0-auditd-config/blob/f1c478a37911a5447d5ffcd580f22b167bf3df14/personality-syscall/README.md
|
||||
- https://learn.microsoft.com/en-us/windows/win32/vss/vshadow-tool-and-sample
|
||||
- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
|
||||
- https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/
|
||||
- https://docs.microsoft.com/en-us/powershell/module/powershellwebaccess/install-pswawebapplication
|
||||
- https://thedfirreport.com/2025/05/19/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware/
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/75fa21076dcefa348a7521403cdd6bfc4e88623c/atomics/T1082/T1082.md
|
||||
- https://firecompass.com/crushftp-vulnerability-cve-2025-54309-securing-file-transfer-services/
|
||||
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-are-being-activated-too-frequently
|
||||
- https://web.archive.org/web/20230217071802/https://blooteem.com/march-2022
|
||||
- https://www.virustotal.com/gui/file/14d886517fff2cc8955844b252c985ab59f2f95b2849002778f03a8f07eb8aef
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4741
|
||||
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations
|
||||
- https://blog.sekoia.io/scattered-spider-laying-new-eggs/
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/reset-computermachinepassword?view=powershell-5.1
|
||||
- https://github.com/varwara/CVE-2024-35250
|
||||
- https://medium.com/@redfanatic7/running-kali-linux-on-windows-51ad95166e6e
|
||||
- https://www.attackiq.com/2023/09/20/emulating-rhysida/
|
||||
- https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/
|
||||
- https://labs.jumpsec.com/tokensmith-bypassing-intune-compliant-device-conditional-access/
|
||||
- https://any.run/report/6eea2773c1b4b5c6fb7c142933e220c96f9a4ec89055bf0cf54accdcde7df535/a407f006-ee45-420d-b576-f259094df091
|
||||
- https://www.bitdefender.com/en-us/blog/businessinsights/shrinklocker-decryptor-from-friend-to-foe-and-back-again
|
||||
- https://bazaar.abuse.ch/sample/5cb9876681f78d3ee8a01a5aaa5d38b05ec81edc48b09e3865b75c49a2187831/
|
||||
- https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/
|
||||
- https://docs.aws.amazon.com/accounts/latest/reference/API_EnableRegion.html
|
||||
- https://www.splunk.com/en_us/blog/security/you-bet-your-lsass-hunting-lsass-access.html
|
||||
- https://thedfirreport.com/2023/04/03/malicious-iso-file-leads-to-domain-wide-ransomware
|
||||
- https://outpost24.com/blog/crushftp-auth-bypass-vulnerability/
|
||||
- https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/5f866ca4517e837c4ea576e7309d0891e78080a8/atomics/T1040/T1040.md#atomic-test-16---powershell-network-sniffing
|
||||
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Delete%20K8S%20events/
|
||||
- https://learn.microsoft.com/en-us/windows/wsl/install
|
||||
- http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
|
||||
- https://tria.ge/240521-ynezpagf56/behavioral1
|
||||
- https://www.geeksforgeeks.org/how-to-kill-processes-on-the-linux-desktop-with-xkill/
|
||||
- https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/
|
||||
- http://www.hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/
|
||||
- https://learn.microsoft.com/en-us/dotnet/api/system.diagnostics.eventing.reader.eventlogsession.clearlog?view=windowsdesktop-9.0&viewFallbackFrom=dotnet-plat-ext-5.0#System_Diagnostics_Eventing_Reader_EventLogSession_ClearLog_System_String_
|
||||
- https://redcanary.com/blog/threat-detection/process-masquerading/
|
||||
- https://github.com/amidaware/tacticalrmm
|
||||
- https://labs.yarix.com/2025/06/doppelganger-an-advanced-lsass-dumper-with-process-cloning/
|
||||
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-aws-console-sign-in-events.html
|
||||
- https://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
|
||||
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_system.html
|
||||
- https://web.archive.org/web/20231015205935/https://githubmemory.com/repo/FunctFan/JNDIExploit
|
||||
- https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/
|
||||
- https://web.archive.org/web/20200530031906/https://techtalk.pcmatic.com/2017/11/30/running-dll-files-malware-analysis/
|
||||
- https://www.proofpoint.com/us/blog/threat-insight/phish-china-aligned-espionage-actors-ramp-up-taiwan-semiconductor-targeting
|
||||
- https://cert.gov.ua/article/6277849
|
||||
- https://adsecurity.org/?p=1785
|
||||
- https://gtfobins.github.io/gtfobins/curl/
|
||||
- https://manual.cs50.io/2/personality
|
||||
- https://thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrusion/
|
||||
- https://learn.microsoft.com/en-us/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide
|
||||
- https://help.fortinet.com/fsiem/Public_Resource_Access/7_2_1/rules/PH_RULE_AWS_Management_Console_Brute_Force_of_Root_User_Identity.htm
|
||||
- https://beierle.win/2024-12-20-Weaponizing-WDAC-Killing-the-Dreams-of-EDR/
|
||||
- http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/
|
||||
- https://tria.ge/241015-l98snsyeje/behavioral2
|
||||
- https://www.ired.team/offensive-security/lateral-movement/winrs-for-lateral-movement
|
||||
- https://en.wikipedia.org/wiki/Right-to-left_override
|
||||
- https://pentestlab.blog/2022/03/21/unconstrained-delegation/
|
||||
- http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
|
||||
- https://hijacklibs.net/entries/microsoft/built-in/mpsvc.html
|
||||
- https://labs.nettitude.com/blog/introducing-sharpwsus/
|
||||
- https://pwn.guide/free/web/crushftp
|
||||
- https://www.cyberciti.biz/faq/how-force-kill-process-linux/
|
||||
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053
|
||||
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/configure-logging-in-iis
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/5ede8f21e42ebe37e0a6eff757dba60bcfa85859/atomics/T1547.001/T1547.001.md
|
||||
- https://www.group-ib.com/resources/threat-research/silence_2.0.going_global.pdf
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/takeown
|
||||
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/deployment/deploy-appcontrol-policies-using-group-policy
|
||||
- https://bazaar.abuse.ch/browse/tag/one/
|
||||
- https://www.kernel.org/doc/html/v4.10/_sources/admin-guide/sysrq.txt
|
||||
- https://x.com/Threatlabz/status/1879956781360976155
|
||||
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_vm.html
|
||||
- https://learn.microsoft.com/en-us/mem/intune/apps/intune-management-extension
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4673
|
||||
- https://us-cert.cisa.gov/ncas/alerts/aa21-008a
|
||||
- https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis
|
||||
- https://learn.microsoft.com/en-us/powershell/module/defender/set-mppreference
|
||||
- https://thecyberexpress.com/rogue-rdp-files-used-in-ukraine-cyberattacks/
|
||||
- https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html
|
||||
- https://rapid7.com/blog/post/2019/02/19/stack-based-buffer-overflow-attacks-what-you-need-to-know/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4732
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/Start-Process?view=powershell-5.1&viewFallbackFrom=powershell-7
|
||||
- https://thedfirreport.com/2025/01/27/cobalt-strike-and-a-pair-of-socks-lead-to-lockbit-ransomware/
|
||||
- https://f5-sdk.readthedocs.io/en/latest/apidoc/f5.bigip.tm.util.html#module-f5.bigip.tm.util.bash
|
||||
- https://cloud.google.com/logging/docs/audit/understanding-audit-logs
|
||||
- https://research.splunk.com/endpoint/7215831c-8252-4ae3-8d43-db588e82f952
|
||||
- https://ss64.com/nt/set.html
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-credentials
|
||||
- https://stackoverflow.com/questions/66011412/how-to-clear-a-event-log-in-powershell-7
|
||||
- https://www.zscaler.com/blogs/security-research/coldriver-updates-arsenal-baitswitch-and-simplefix
|
||||
- https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/set_1
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2025-2825
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd364427(v=ws.10)
|
||||
- http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
|
||||
- https://news.ycombinator.com/item?id=29504755
|
||||
- https://www.elastic.co/docs/reference/security/prebuilt-rules/rules/integrations/aws/defense_evasion_ec2_flow_log_deletion
|
||||
- https://manpages.debian.org/unstable/ecasound/ecasound.1.en.html
|
||||
- https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-identity-roles.html
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731935(v=ws.11)
|
||||
- https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/
|
||||
- https://redcanary.com/blog/threat-intelligence/intelligence-insights-october-2024/
|
||||
- https://localtonet.com/documents/supported-tunnels
|
||||
- https://www.picussecurity.com/resource/blog/as-rep-roasting-attack-explained-mitre-attack-t1558.004
|
||||
- https://paper.seebug.org/1495/
|
||||
- http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/
|
||||
- https://community.openvpn.net/openvpn/wiki/ManagingWindowsTAPDrivers
|
||||
- https://app.any.run/tasks/69c5abaa-92ad-45ba-8c53-c11e23e05d04/
|
||||
- https://web.archive.org/web/20231210115125/http://www.xuetr.com/
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/winrs
|
||||
- https://learn.microsoft.com/en-us/sysinternals/downloads/autoruns
|
||||
- https://gtfobins.github.io/gtfobins/capsh/#shell
|
||||
- https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing
|
||||
- https://learn.microsoft.com/en-us/windows/win32/cimwin32prov/delete-method-in-class-win32-service
|
||||
- https://medium.com/@ninnesoturan/detecting-ipv6-dns-takeover-a54a6a88be1f
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-6423
|
||||
- https://github.com/0xthirteen/SharpMove/
|
||||
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DeleteFlowLogs.html
|
||||
- https://learn.microsoft.com/en-us/iis/configuration/system.webserver/httplogging
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/evolution-of-fin7/
|
||||
- https://x.com/wietze/status/1958302556033065292?s=12
|
||||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-wkst/55118c55-2122-4ef9-8664-0c1ff9e168f3
|
||||
- https://www.esentire.com/security-advisories/netsupport-rat-clickfix-distribution
|
||||
- https://blog.malwarebytes.com/malwarebytes-news/2021/02/lazyscripter-from-empire-to-double-rat/
|
||||
- https://github.com/EvotecIT/TheDashboard/blob/481a9ce8f82f2fd55fe65220ee6486bae6df0c9d/Examples/RunReports/PingCastle.ps1
|
||||
- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode
|
||||
- https://www.softperfect.com/products/networkscanner/
|
||||
- https://www.microsoft.com/en-us/security/blog/2025/04/15/threat-actors-misuse-node-js-to-deliver-malware-and-other-malicious-payloads/
|
||||
- https://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
|
||||
- https://www.hexacorn.com/blog/2017/01/14/beyond-good-ol-run-key-part-53/
|
||||
- https://github.com/The-Viper-One/Invoke-PowerDPAPI/
|
||||
- https://medium.com/r3d-buck3t/red-teaming-in-cloud-leverage-azure-frontdoor-cdn-for-c2-redirectors-79dd9ca98178
|
||||
- https://portswigger.net/daily-swig/vmware-horizon-under-attack-as-china-based-ransomware-group-targets-log4j-vulnerability
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-successful-unusual-sign-ins
|
||||
- https://learn.microsoft.com/fr-fr/windows-server/administration/windows-commands/fsutil-behavior
|
||||
- https://web.archive.org/web/20210629055600/https://github.com/hhlxf/PrintNightmare/
|
||||
- https://gist.github.com/travisbgreen/82b68bac499edbe0b17dcbfa0c5c71b7
|
||||
- https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/
|
||||
- https://web.archive.org/web/20220205033028/https://twitter.com/PythonResponder/status/1385064506049630211
|
||||
- https://learn.microsoft.com/en-us/sql/t-sql/statements/truncate-table-transact-sql?view=sql-server-ver16
|
||||
- https://sysdig.com/blog/detecting-and-mitigating-cve-2024-12084-rsync-remote-code-execution/
|
||||
- https://www.deepwatch.com/labs/customer-advisory-fortios-ssl-vpn-vulnerability-cve-2022-42475-exploited-in-the-wild/
|
||||
- https://trustedsec.com/blog/command-line-underdog-wmic-in-action
|
||||
- https://github.com/Ylianst/MeshAgent/blob/52cf129ca43d64743181fbaf940e0b4ddb542a37/modules/win-dispatcher.js#L173
|
||||
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
|
||||
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
|
||||
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/4/html/reference_guide/s3-proc-sys-kernel
|
||||
- https://medium.com/@NullByteWht/hacking-macos-how-to-dump-1password-keepassx-lastpass-passwords-in-plaintext-723c5b1c311b
|
||||
- https://goodworkaround.com/2022/02/15/digging-into-azure-ad-certificate-based-authentication/
|
||||
- https://www.hexacorn.com/blog/2018/04/24/extexport-yet-another-lolbin/
|
||||
- https://thedfirreport.com/2025/02/24/confluence-exploit-leads-to-lockbit-ransomware/
|
||||
- https://github.com/HackTricks-wiki/hacktricks/blob/e4c7b21b8f36c97c35b7c622732b38a189ce18f7/src/windows-hardening/windows-local-privilege-escalation/privilege-escalation-with-autorun-binaries.md
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/dnscmd
|
||||
- https://docs.microsoft.com/en-us/windows/win32/etw/configuring-and-starting-an-autologger-session
|
||||
- https://research.nccgroup.com/2018/11/22/turla-png-dropper-is-back/
|
||||
- https://www.chrisfarris.com/post/effective-aws-ransomware/
|
||||
- https://harfanglab.io/insidethelab/uac-0057-pressure-ukraine-poland/
|
||||
- https://www.threatdown.com/blog/clipboard-hijacker-tries-to-install-a-trojan/
|
||||
- https://www.cisa.gov/stopransomware/ransomware-guide
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/assoc
|
||||
- https://naikordian.github.io/blog/posts/brute-force-aws-console/
|
||||
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Vshadow/
|
||||
- https://www.pcrisk.com/removal-guides/31853-funklocker-funksec-ransomware
|
||||
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/getting-started-with-nftables_configuring-and-managing-networking
|
||||
- https://github.com/dsnezhkov/TruffleSnout/blob/7c2f22e246ef704bc96c396f66fa854e9ca742b9/TruffleSnout/Docs/USAGE.md
|
||||
- https://github.com/swagkarna/Defeat-Defender-V1.2.0/tree/ae4059c4276da6f6303b8f53cdff085ecae88a91
|
||||
- https://www.huntress.com/blog/blackcat-ransomware-affiliate-ttps
|
||||
- https://web.archive.org/web/20190508165435/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
|
||||
- https://thedfirreport.com/2024/04/29/from-icedid-to-dagon-locker-ransomware-in-29-days/
|
||||
- https://fourcore.io/blogs/threat-hunting-browser-credential-stealing
|
||||
- https://wazuh.com/blog/how-to-detect-meshagent-with-wazuh/
|
||||
- https://man7.org/linux/man-pages/man2/personality.2.html
|
||||
- https://linux.die.net/man/8/auditct
|
||||
- https://www.synacktiv.com/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025
|
||||
- https://web.archive.org/web/20220319032520/https://blog.redbluepurple.io/offensive-research/bypassing-injection-detection
|
||||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/d42db7d5-f141-4466-8f47-0a4be14e2fc1
|
||||
- https://www.virustotal.com/gui/file/e96a0c1bc5f720d7f0a53f72e5bb424163c943c24a437b1065957a79f5872675
|
||||
- https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucket.html
|
||||
- https://x.com/NullSecurityX/status/1937444064867029179
|
||||
- https://www.huntress.com/blog/silencing-the-edr-silencers
|
||||
- https://apophis133.medium.com/powershell-script-tactical-rmm-installation-45afb639eff3
|
||||
- https://learn.microsoft.com/en-us/dotnet/framework/tools/regasm-exe-assembly-registration-tool
|
||||
- https://awscli.amazonaws.com/v2/documentation/api/2.14.0/reference/account/enable-region.html
|
||||
- https://www.huntress.com/blog/fake-browser-updates-lead-to-boinc-volunteer-computing-software
|
||||
- https://gtfobins.github.io/gtfobins/rsync/#shell
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-failed-unusual-sign-ins
|
||||
- https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/
|
||||
- https://github.com/fortra/impacket/blob/ff8c200fd040b04d3b5ff05449646737f836235d/examples/secretsdump.py
|
||||
- https://www.elastic.co/guide/en/security/current/potential-non-standard-port-ssh-connection.html
|
||||
- https://research.ifcr.dk/certipy-4-0-esc9-esc10-bloodhound-gui-new-authentication-and-request-methods-and-more-7237d88061f7
|
||||
- https://www.binarly.io/blog/design-issues-of-modern-edrs-bypassing-etw-based-solutions
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/
|
||||
- https://www.cve.org/CVERecord?id=CVE-2024-1709
|
||||
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
|
||||
- https://www.hexacorn.com/blog/2023/06/07/this-lolbin-doesnt-exist/
|
||||
- https://www.wiz.io/blog/how-to-set-secure-defaults-on-aws
|
||||
- https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html
|
||||
- https://learn.microsoft.com/en-us/sql/t-sql/statements/drop-table-transact-sql?view=sql-server-ver16
|
||||
- https://syedhasan010.medium.com/forensics-analysis-of-an-lnk-file-da68a98b8415
|
||||
- https://www.hexacorn.com/blog/2024/10/12/the-sweet16-the-oldbin-lolbin-called-setup16-exe/
|
||||
- https://informationsecuritybuzz.com/the-real-danger-behind-a-simple-windows-shortcut/
|
||||
- https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-monitor-federation-changes
|
||||
- https://x.com/cyberfeeddigest/status/1887041526397587859
|
||||
- https://www.nccgroup.com/us/research-blog/lapsus-recent-techniques-tactics-and-procedures/
|
||||
- https://www.vectra.ai/blog/undermining-microsoft-teams-security-by-mining-tokens
|
||||
- https://learn.microsoft.com/en-us/previous-versions/dotnet/framework/data/wcf/wcf-data-service-client-utility-datasvcutil-exe
|
||||
- https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/
|
||||
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/deployment/deploy-appcontrol-policies-with-memcm
|
||||
- https://www.loobins.io/binaries/nscurl/
|
||||
- https://bazaar.abuse.ch/sample/7bde840c7e8c36dce4c3bac937bcf39f36a6f118001b406bfbbc25451ce44fb4/
|
||||
- https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf
|
||||
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#password-spray
|
||||
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage
|
||||
- https://twitter.com/th3_protoCOL/status/1536788652889497600
|
||||
- https://www.fortalicesolutions.com/posts/hiding-behind-the-front-door-with-azure-domain-fronting
|
||||
- https://securelist.com/key-group-ransomware-samples-and-telegram-schemes/114025/
|
||||
- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html
|
||||
- https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/
|
||||
- https://learn.microsoft.com/en-us/visualstudio/debugger/debug-using-the-just-in-time-debugger?view=vs-2019
|
||||
- https://www.trendmicro.com/en_us/research/25/i/an-mdr-analysis-of-the-amos-stealer-campaign.html
|
||||
- https://www.virustotal.com/gui/file/f9710b0ba4de5fa0e7ec27da462d4d2fc6838eba83a19f23f6617a466bbad457
|
||||
- https://research.splunk.com/endpoint/3742ebfe-64c2-11eb-ae93-0242ac130002
|
||||
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#new-country
|
||||
- https://www.vaadata.com/blog/what-is-command-injection-exploitations-and-security-best-practices/
|
||||
- https://www.pwndefend.com/2022/01/07/log4shell-exploitation-and-hunting-on-vmware-horizon-cve-2021-44228/
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/unc3944-targets-saas-applications
|
||||
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Privileged%20container/
|
||||
- https://www.group-ib.com/blog/apt41-world-tour-2021/
|
||||
- https://learn.microsoft.com/en-us/windows/win32/setupapi/run-and-runonce-registry-keys
|
||||
- https://web.archive.org/web/20230329154538/https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html
|
||||
- https://www.broadcom.com/support/security-center/protection-bulletin/funksec-ransomware
|
||||
- https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/
|
||||
- https://medium.com/falconforce/soaphound-tool-to-collect-active-directory-data-via-adws-165aca78288c
|
||||
- https://github.com/nasbench/Misc-Research/blob/fc46f6da34ff7e0076da28fd3e66d6e1100f1c2f/ETW/Microsoft-Windows-SMBClient.md
|
||||
- https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-windowsai#disableaidataanalysis
|
||||
- https://research.nccgroup.com/2018/03/10/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/
|
||||
- https://us-cert.cisa.gov/ncas/alerts/aa21-259a
|
||||
- https://securelist.com/apt41-in-africa/116986/
|
||||
- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/
|
||||
- https://docs.python.org/2/library/simplehttpserver.html
|
||||
- https://blackpointcyber.com/blog/racing-to-exploit-centrestacks-cve-2025-30406/
|
||||
- https://securitylabs.datadoghq.com/cloud-security-atlas/vulnerabilities/iam-user-without-mfa/
|
||||
- https://x.com/nas_bench/status/1868639048484425963
|
||||
- https://web.archive.org/web/20230331181619/https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
|
||||
- https://www.getsafety.com/blog-posts/shai-hulud-npm-attack
|
||||
- https://tria.ge/231212-r1bpgaefar/behavioral2
|
||||
- https://learn.microsoft.com/en-us/windows/win32/shell/launch
|
||||
- https://www.welivesecurity.com/2020/07/16/mac-cryptocurrency-trading-application-rebranded-bundled-malware/
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/alphv-ransomware-backup/
|
||||
- https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
|
||||
- https://www.virustotal.com/gui/search/behaviour_network%253A*.miningocean.org/files
|
||||
- https://www.zerosalarium.com/2025/09/EDR-Freeze-Puts-EDRs-Antivirus-Into-Coma.html
|
||||
- https://www.joesandbox.com/analysis/1467354/0/html
|
||||
- https://app.any.run/tasks/9a8fd563-4c54-4d0a-9ad8-1fe08339cbc3/
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts#assignment-and-elevation
|
||||
- https://learn.microsoft.com/en-us/windows/compatibility/ntvdm-and-16-bit-app-support
|
||||
- https://twitter.com/Kostastsale/status/1480716528421011458
|
||||
- https://github.com/logangoins/Krueger/tree/main
|
||||
- https://learn.microsoft.com/en-us/dotnet/api/system.diagnostics.eventlog.clear
|
||||
- https://github.com/ossec/ossec-hids/blob/f6502012b7380208db81f82311ad4a1994d39905/etc/rules/syslog_rules.xml
|
||||
- https://web.archive.org/web/20221204161143/https://www.glitch-cat.com/p/green-lambert-and-attack
|
||||
- https://dear-territory-023.notion.site/WebDav-Share-Testing-e4950fa0c00149c3aa430d779b9b1d0f?pvs=4
|
||||
- https://app.any.run/tasks/5c16b4db-4b36-4039-a0ed-9b09abff8be2
|
||||
- https://www.intrinsec.com/alphv-ransomware-gang-analysis/?cn-reloaded=1
|
||||
- https://learn.microsoft.com/en-us/windows/client-management/client-tools/quick-assist
|
||||
- https://www.sentinelone.com/blog/exploiting-repos-6-ways-threat-actors-abuse-github-other-devops-platforms
|
||||
- https://github.com/rtecCyberSec/BitlockMove
|
||||
- https://medium.com/@boutnaru/the-windows-foreniscs-journey-run-mru-run-dialog-box-most-recently-used-57375a02d724
|
||||
- https://tria.ge/241231-j9yatstqbm/behavioral1
|
||||
- https://learn.microsoft.com/en-us/windows/package-manager/winget/install#local-install
|
||||
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#atypical-travel
|
||||
- https://www.linkedin.com/posts/kevin-beaumont-security_ive-been-assisting-a-few-orgs-hit-with-successful-activity-7268055739116445701-xxjZ/
|
||||
- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
|
||||
- https://blog.appsecco.com/kubernetes-namespace-breakout-using-insecure-host-path-volume-part-1-b382f2a6e216
|
||||
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
|
||||
- https://www.loobins.io/binaries/launchctl/
|
||||
- https://gist.github.com/Dump-GUY/8daef859f382b895ac6fd0cf094555d2
|
||||
- https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/
|
||||
- https://learn.microsoft.com/en-us/sql/t-sql/statements/alter-server-audit-transact-sql?view=sql-server-ver16
|
||||
- https://www.hexacorn.com/blog/2024/01/01/1-little-known-secret-of-hdwwiz-exe/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4771
|
||||
- https://www.welivesecurity.com/2020/03/05/guildma-devil-drives-electric/
|
||||
- https://www.loobins.io/binaries/pbpaste/
|
||||
- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
|
||||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9
|
||||
- https://darkatlas.io/blog/medusa-ransomware-group-opsec-failure
|
||||
- https://www.youtube.com/watch?v=uSYvHUVU8xY
|
||||
- https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/
|
||||
- https://web.archive.org/web/20210725081645/https://github.com/cube0x0/CVE-2021-36934
|
||||
- https://www.security.com/threat-intelligence/medusa-ransomware-attacks
|
||||
- https://restic.readthedocs.io/en/stable/030_preparing_a_new_repo.html
|
||||
- https://web.archive.org/web/20180203014709/https://blog.alsid.eu/dcshadow-explained-4510f52fc19d?gi=c426ac876c48
|
||||
- https://redcanary.com/blog/threat-intelligence/intelligence-insights-may-2025/
|
||||
- https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/
|
||||
- https://www.elastic.co/guide/en/security/current/unusual-file-modification-by-dns-exe.html
|
||||
- https://github.com/JohnHammond/recaptcha-phish
|
||||
- https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/security-log-events
|
||||
- https://www.linkedin.com/posts/huntress-labs_when-a-sketchy-incident-hits-your-network-activity-7304940371078238208-Th_l/?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAJTlRcB28IaUtg03HUU-IdliwzoAL1flGc
|
||||
- https://www.aon.com/cyber-solutions/aon_cyber_labs/yours-truly-signed-av-driver-weaponizing-an-antivirus-driver/
|
||||
- https://www.joesandbox.com/analysis/1605063/0/html
|
||||
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/applocker/what-is-applocker
|
||||
- https://app.any.run/tasks/ea944b89-69d8-49c8-ac1f-5c76ad300db2
|
||||
- https://medium.com/@shaherzakaria8/downloading-trojan-lumma-infostealer-through-capatcha-1f25255a0e71
|
||||
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage
|
||||
- https://www.virustotal.com/gui/file/d2a4f52a9923336f119a52e531bbb1e66f18322fd8efa9af1a64b94f4d36dc97
|
||||
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::IZ_UNCAsIntranet
|
||||
- https://support.kaspersky.com/KES4Linux/12.0.0/en-US/197929.htm
|
||||
- https://app.any.run/tasks/1efb3ed4-cc0f-4690-a0ed-24516809bc72/
|
||||
- https://catalyst.prodaft.com/public/report/inside-the-latest-espionage-campaign-of-nebulous-mantis
|
||||
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/List%20K8S%20secrets/
|
||||
- https://gtfobins.github.io/gtfobins/gcc/#shell
|
||||
- https://www.cyberciti.biz/faq/show-all-running-processes-in-linux/
|
||||
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/s3api/delete-bucket.html
|
||||
- https://intel.thedfirreport.com/eventReports/view/70
|
||||
- https://news.sophos.com/en-us/2025/08/26/velociraptor-incident-response-tool-abused-for-remote-access/
|
||||
- https://cert.gov.ua/article/6284080
|
||||
- https://www.anyviewer.com/help/remote-technical-support.html
|
||||
- https://github.com/okta/workflows-templates/blob/1164f0eb71ce47c9ddc7d850e9ab87b5a2b42333/workflows/suspicious_activity_reported/readme.md
|
||||
- https://web.archive.org/web/20211001064856/https://github.com/snovvcrash/DInjector
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#appid-uri-added-modified-or-removed
|
||||
- https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/
|
||||
- https://docs.microsoft.com/en-us/powershell/module/powershellwebaccess/install-pswawebapplication
|
||||
- https://learn.microsoft.com/fr-fr/windows-server/administration/windows-commands/fsutil-behavior
|
||||
- https://learn.microsoft.com/en-us/dotnet/api/system.identitymodel.tokens.kerberosrequestorsecuritytoken?view=netframework-4.8.1
|
||||
- https://www.welivesecurity.com/2020/03/05/guildma-devil-drives-electric/
|
||||
- https://en.wikipedia.org/wiki/Right-to-left_override
|
||||
- https://github.com/clearvector/lambda-spy
|
||||
- https://www.binarly.io/blog/design-issues-of-modern-edrs-bypassing-etw-based-solutions
|
||||
- https://gtfobins.github.io/gtfobins/rsync/#shell
|
||||
- https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/reagentc-command-line-options?view=windows-11
|
||||
- https://www.cve.org/CVERecord?id=CVE-2024-1709
|
||||
- https://www.scip.ch/en/?labs.20240523
|
||||
- https://feeds.alphasoc.net/bad-etlds.txt
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4625
|
||||
- https://www.huntress.com/blog/the-unwanted-guest
|
||||
- https://learn.microsoft.com/en-us/entra/id-protection/howto-identity-protection-configure-mfa-policy
|
||||
- https://x.com/Wietze/status/1933495426952421843
|
||||
- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/
|
||||
- https://www.malwarebytes.com/blog/detections/pum-optional-nodispbackgroundpage
|
||||
- https://github.com/TwoSevenOneT/EDR-Freeze
|
||||
- https://web.archive.org/web/20170909091934/https://blog.binarydefense.com/reliably-detecting-pass-the-hash-through-event-log-analysis
|
||||
- https://strontic.github.io/xcyclopedia/library/dialer.exe-0B69655F912619756C704A0BF716B61F.html
|
||||
- https://research.checkpoint.com/2024/raspberry-robin-keeps-riding-the-wave-of-endless-1-days/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4661
|
||||
- https://www.aon.com/cyber-solutions/aon_cyber_labs/yours-truly-signed-av-driver-weaponizing-an-antivirus-driver/
|
||||
- https://www.virustotal.com/gui/file/14e722855605ba78dc1d21153f0e1be90e7528149f2cd2d7d6eba8ef27534bdc/behavior
|
||||
- https://taggart-tech.com/evildeno/
|
||||
- https://man7.org/linux/man-pages/man2/syslog.2.html
|
||||
- https://www.hexacorn.com/blog/2023/12/31/1-little-known-secret-of-forfiles-exe/
|
||||
- https://learn.microsoft.com/en-us/iis/configuration/system.webserver/httplogging
|
||||
- https://github.com/JohnHammond/recaptcha-phish
|
||||
- https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/push-protection-for-repositories-and-organizations
|
||||
- https://www.getsafety.com/blog-posts/shai-hulud-npm-attack
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.security/get-acl?view=powershell-7.4
|
||||
- https://thedfirreport.com/2025/01/27/cobalt-strike-and-a-pair-of-socks-lead-to-lockbit-ransomware/
|
||||
- https://trustedsec.com/blog/command-line-underdog-wmic-in-action
|
||||
- https://github.com/swagkarna/Defeat-Defender-V1.2.0/tree/ae4059c4276da6f6303b8f53cdff085ecae88a91
|
||||
- https://learn.microsoft.com/en-us/visualstudio/debugger/debug-using-the-just-in-time-debugger?view=vs-2019
|
||||
- https://pwn.guide/free/web/crushftp
|
||||
- https://web.archive.org/web/20180203014709/https://blog.alsid.eu/dcshadow-explained-4510f52fc19d?gi=c426ac876c48
|
||||
- https://github.com/HackTricks-wiki/hacktricks/blob/e4c7b21b8f36c97c35b7c622732b38a189ce18f7/src/windows-hardening/windows-local-privilege-escalation/privilege-escalation-with-autorun-binaries.md
|
||||
- https://www.elastic.co/docs/reference/security/prebuilt-rules/rules/integrations/aws/defense_evasion_ec2_flow_log_deletion
|
||||
- https://learn.microsoft.com/en-us/windows-hardware/drivers/devtest/bcdedit--set
|
||||
- https://www.hexacorn.com/blog/2018/09/02/beyond-good-ol-run-key-part-86/
|
||||
- https://ngrok.com/blog-post/new-ngrok-domains
|
||||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1110.001/aws_login_failure/aws_cloudtrail_events.json
|
||||
- https://www.atomicredteam.io/atomic-red-team/atomics/T1562.012
|
||||
- https://reliaquest.com/blog/threat-spotlight-cve-2025-54309-crushftp-exploit/
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites
|
||||
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion/
|
||||
- https://research.splunk.com/endpoint/395ed5fe-ad13-4366-9405-a228427bdd91/
|
||||
- https://learn.microsoft.com/en-us/windows/win32/debug/configuring-automatic-debugging
|
||||
- https://www.blackhillsinfosec.com/mitm6-strikes-again-the-dark-side-of-ipv6/
|
||||
- https://www.elastic.co/security-labs/maas-appeal-an-infostealer-rises-from-the-ashes
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31324
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#service-principal-assigned-to-a-role
|
||||
- https://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows
|
||||
- https://docs.oracle.com/cd/E19683-01/816-4883/6mb2joatd/index.html
|
||||
- https://docs.aws.amazon.com/kms/latest/developerguide/ct-deleteimportedkeymaterial.html
|
||||
- https://github.com/codewhitesec/SysmonEnte/blob/fe267690fcc799fbda15398243615a30451d9099/screens/1.png
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-granted-highly-privileged-permissions
|
||||
- https://www.nextron-systems.com/2025/07/29/detecting-the-most-popular-mitre-persistence-method-registry-run-keys-startup-folder/
|
||||
- https://www.huntress.com/blog/attacking-mssql-servers-pt-ii
|
||||
- https://darkatlas.io/blog/medusa-ransomware-group-opsec-failure
|
||||
- https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC
|
||||
- https://blackpointcyber.com/blog/racing-to-exploit-centrestacks-cve-2025-30406/
|
||||
- https://catalyst.prodaft.com/public/report/inside-the-latest-espionage-campaign-of-nebulous-mantis
|
||||
- https://tria.ge/240731-jh4crsycnb/behavioral2
|
||||
- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection
|
||||
- https://github.com/nasbench/EVTX-ETW-Resources/blob/f1b010ce0ee1b71e3024180de1a3e67f99701fe4/ETWProvidersManifests/Windows10/1903/W10_1903_Pro_20200714_18362.959/WEPExplorer/Microsoft-Windows-WindowsUpdateClient.xml
|
||||
- https://www.virustotal.com/gui/file/54d60fd58d7fa3475fa123985bfc1594df26da25c1f5fbc7dfdba15876dd8ac5/behavior
|
||||
- https://linux-audit.com/linux-aslr-and-kernelrandomize_va_space-setting/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4616
|
||||
- https://app.any.run/tasks/ea944b89-69d8-49c8-ac1f-5c76ad300db2
|
||||
- https://www.picussecurity.com/resource/blog/as-rep-roasting-attack-explained-mitre-attack-t1558.004
|
||||
- https://x.com/NullSecurityX/status/1937444064867029179
|
||||
- https://bazaar.abuse.ch/sample/7bde840c7e8c36dce4c3bac937bcf39f36a6f118001b406bfbbc25451ce44fb4/
|
||||
- https://www.hexacorn.com/blog/2020/08/23/certutil-one-more-gui-lolbin
|
||||
- https://f5-sdk.readthedocs.io/en/latest/apidoc/f5.bigip.tm.util.html#module-f5.bigip.tm.util.bash
|
||||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-wkst/55118c55-2122-4ef9-8664-0c1ff9e168f3
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/114404382/config-vpn-ssl-settings
|
||||
- https://learn.microsoft.com/en-us/dotnet/api/system.directoryservices.accountmanagement?view=net-8.0
|
||||
- https://goodworkaround.com/2022/02/15/digging-into-azure-ad-certificate-based-authentication/
|
||||
- https://app.any.run/tasks/1efb3ed4-cc0f-4690-a0ed-24516809bc72/
|
||||
- https://us-cert.cisa.gov/ncas/alerts/aa21-008a
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4771
|
||||
- https://learn.microsoft.com/en-us/sql/t-sql/statements/truncate-table-transact-sql?view=sql-server-ver16
|
||||
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/s3api/delete-bucket.html
|
||||
- https://gist.github.com/travisbgreen/82b68bac499edbe0b17dcbfa0c5c71b7
|
||||
- http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
|
||||
- https://medium.com/@ninnesoturan/detecting-ipv6-dns-takeover-a54a6a88be1f
|
||||
- https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-monitor-federation-changes
|
||||
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/4/html/reference_guide/s3-proc-sys-kernel
|
||||
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::SecurityPage_AutoDetect
|
||||
- https://gist.github.com/Dump-GUY/8daef859f382b895ac6fd0cf094555d2
|
||||
- https://localtonet.com/documents/supported-tunnels
|
||||
- https://asec.ahnlab.com/en/40263/
|
||||
- https://docs.aws.amazon.com/accounts/latest/reference/API_EnableRegion.html
|
||||
- https://vipre.com/blog/svg-phishing-attacks-the-new-trick-in-the-cybercriminals-playbook/
|
||||
- https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/
|
||||
- https://web.archive.org/web/20210725081645/https://github.com/cube0x0/CVE-2021-36934
|
||||
- https://www.welivesecurity.com/2020/07/16/mac-cryptocurrency-trading-application-rebranded-bundled-malware/
|
||||
- https://web.archive.org/web/20221204161143/https://www.glitch-cat.com/p/green-lambert-and-attack
|
||||
- https://www.threatdown.com/blog/clipboard-hijacker-tries-to-install-a-trojan/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4732
|
||||
- https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-identity-roles.html
|
||||
- https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability
|
||||
- https://tria.ge/231023-lpw85she57/behavioral2
|
||||
- https://github.com/msanft/CVE-2025-55182
|
||||
- https://www.zscaler.com/blogs/security-research/coldriver-updates-arsenal-baitswitch-and-simplefix
|
||||
- https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-5038
|
||||
- https://www.joesandbox.com/analysis/1605063/0/html
|
||||
- https://x.com/cyberfeeddigest/status/1887041526397587859
|
||||
- https://restic.readthedocs.io/en/stable/030_preparing_a_new_repo.html
|
||||
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-aws-console-sign-in-events.html
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/113121765/config-vpn-ssl-web-portal
|
||||
- https://learn.microsoft.com/en-us/sql/tools/sqlps-utility?view=sql-server-ver15
|
||||
- https://github.com/HackTricks-wiki/hacktricks/blob/72f20a3fa26775b932bd819f1824c6377802a768/src/windows-hardening/basic-cmd-for-pentesters.md#firewall
|
||||
- https://docs.python.org/2/library/simplehttpserver.html
|
||||
- https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/unattend/microsoft-windows-terminalservices-rdp-winstationextensions-securitylayer
|
||||
- https://github.com/wietze/HijackLibs/tree/dc9c9f2f94e6872051dab58fbafb043fdd8b4176/yml/3rd_party/python
|
||||
- https://www.huntress.com/blog/blackcat-ransomware-affiliate-ttps
|
||||
- https://www.loobins.io/binaries/pbpaste/
|
||||
- https://web.archive.org/web/20190508165435/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
|
||||
- https://labs.jumpsec.com/tokensmith-bypassing-intune-compliant-device-conditional-access/
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics
|
||||
- https://gtfobins.github.io/gtfobins/gawk/#shell
|
||||
- https://github.com/logangoins/Krueger/tree/main
|
||||
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/configure-logging-in-iis
|
||||
- https://docs.python.org/3/library/http.server.html
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/75fa21076dcefa348a7521403cdd6bfc4e88623c/atomics/T1124/T1124.md
|
||||
- https://thedfirreport.com/2025/05/19/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware/
|
||||
- https://hopeness.medium.com/master-the-linux-mknod-command-a-comprehensive-guide-1c150a546aa8
|
||||
- https://www.linkedin.com/posts/kevin-beaumont-security_ive-been-assisting-a-few-orgs-hit-with-successful-activity-7268055739116445701-xxjZ/
|
||||
- https://www.linkedin.com/posts/mauricefielenbach_sharepoint-incidentresponse-windowssecurity-activity-7352653907363303425-bL2f
|
||||
- https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-windowsai#disableaidataanalysis
|
||||
- https://mp.weixin.qq.com/s/wUoBy7ZiqJL2CUOMC-8Wdg
|
||||
- https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/
|
||||
- https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/
|
||||
- https://securitylabs.datadoghq.com/articles/shai-hulud-2.0-npm-worm/
|
||||
- https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/
|
||||
- https://github.com/trufflesecurity/trufflehog
|
||||
- https://learn.microsoft.com/en-us/powershell/module/dism/enable-windowsoptionalfeature?view=windowsserver2022-ps
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1490/T1490.md#atomic-test-12---disable-time-machine
|
||||
- https://github.com/mulwareX/CVE-2025-6218-POC
|
||||
- https://man7.org/linux/man-pages/man2/mknod.2.html
|
||||
- https://news.sophos.com/en-us/2024/08/07/sophos-mdr-hunt-tracks-mimic-ransomware-campaign-against-organizations-in-india/
|
||||
- https://www.hackingarticles.in/defense-evasion-windows-event-logging-t1562-002/
|
||||
- https://docs.aws.amazon.com/kms/latest/developerguide/ct-importkeymaterial.html
|
||||
- https://learn.microsoft.com/de-de/sysinternals/downloads/adexplorer
|
||||
- https://restic.net/
|
||||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
|
||||
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
|
||||
- https://mrd0x.com/filefix-clickfix-alternative/
|
||||
- https://cardinalops.com/blog/the-art-of-anomaly-hunting-patterns-detection/
|
||||
- https://labs.yarix.com/2025/06/doppelganger-an-advanced-lsass-dumper-with-process-cloning/
|
||||
- https://support.microsoft.com/en-us/office/data-security-and-python-in-excel-33cc88a4-4a87-485e-9ff9-f35958278327
|
||||
- https://www.elastic.co/security-labs/grimresource
|
||||
- https://thedfirreport.com/2024/09/30/nitrogen-campaign-drops-sliver-and-ends-with-blackcat-ransomware/#exfiltration
|
||||
- https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/
|
||||
- https://github.com/bobby-tablez/TTP-Threat-Feeds/blob/45398914e631f8372c3a9fbcd339ff65ffff1b17/results/2025/10/20251001-161956-trendmicro-atomic-macos-stealer-(amos).yml#L44
|
||||
- https://ngrok.com/blog-post/new-ngrok-domains
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4616
|
||||
- https://www.wiz.io/blog/how-to-set-secure-defaults-on-aws
|
||||
- https://gist.github.com/swachchhanda000/a0228130f86a2dedfbcebb415b47f870
|
||||
- https://www.fortiguard.com/psirt/FG-IR-24-535
|
||||
- https://beierle.win/2024-12-20-Weaponizing-WDAC-Killing-the-Dreams-of-EDR/
|
||||
- https://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows
|
||||
- https://www.softperfect.com/products/networkscanner/
|
||||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
|
||||
- https://www.loobins.io/binaries/launchctl/
|
||||
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations
|
||||
- https://github.com/pr0xylife/Pikabot/blob/fc58126127adf0f65e78f4eec59675523f48f086/Pikabot_22.12.2023.txt
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/systeminfo
|
||||
- https://unicornofhunt.com/2025/05/22/When-Unicorns-Go-Quiet-BITS-Jobs-and-the-Art-of-Stealthy-Transfers/
|
||||
- https://thedfirreport.com/2025/06/30/hide-your-rdp-password-spray-leads-to-ransomhub-deployment/
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/Start-Process?view=powershell-5.1&viewFallbackFrom=powershell-7
|
||||
- https://www.trendmicro.com/en_us/research/25/i/unmasking-the-gentlemen-ransomware.html
|
||||
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/deployment/deploy-appcontrol-policies-using-group-policy
|
||||
- https://www.greynoise.io/blog/new-scraper-botnet-concentrated-in-taiwan
|
||||
- https://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures
|
||||
- https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/
|
||||
- https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/
|
||||
- https://learn.microsoft.com/en-us/windows/package-manager/winget/install#local-install
|
||||
- https://www.bleepingcomputer.com/news/security/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/
|
||||
- http://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
|
||||
- https://www.pwndefend.com/2022/01/07/log4shell-exploitation-and-hunting-on-vmware-horizon-cve-2021-44228/
|
||||
- https://web.archive.org/web/20200601000524/https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/
|
||||
- https://www.hexacorn.com/blog/2018/08/31/beyond-good-ol-run-key-part-85/
|
||||
- https://github.com/fortra/impacket/blob/ff8c200fd040b04d3b5ff05449646737f836235d/examples/secretsdump.py
|
||||
- https://web.archive.org/web/20200530031906/https://techtalk.pcmatic.com/2017/11/30/running-dll-files-malware-analysis/
|
||||
- https://blog.sekoia.io/scattered-spider-laying-new-eggs/
|
||||
- https://medium.com/@shaherzakaria8/downloading-trojan-lumma-infostealer-through-capatcha-1f25255a0e71
|
||||
- https://blog.talosintelligence.com/understanding-the-phobos-affiliate-structure/
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/winrs
|
||||
- https://www.virustotal.com/gui/search/behaviour_processes%253A%2522C%253A%255C%255CWindows%255C%255CSysWOW64%255C%255Cmore.com%2522%2520behaviour_processes%253A%2522C%253A%255C%255CWindows%255C%255CMicrosoft.NET%255C%255CFramework%255C%255Cv4.0.30319%255C%255Cvbc.exe%2522/files
|
||||
- https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4776
|
||||
- https://feeds.alphasoc.net/bad-etlds.txt
|
||||
- https://intel.thedfirreport.com/eventReports/view/57
|
||||
- https://help.fortinet.com/fsiem/Public_Resource_Access/7_2_1/rules/PH_RULE_AWS_Management_Console_Brute_Force_of_Root_User_Identity.htm
|
||||
- https://manual.cs50.io/2/personality
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/328136827/config-user-group
|
||||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1110.001/aws_login_failure/aws_cloudtrail_events.json
|
||||
- https://github.com/CheraghiMilad/bypass-Neo23x0-auditd-config/blob/f1c478a37911a5447d5ffcd580f22b167bf3df14/personality-syscall/README.md
|
||||
- https://web.archive.org/web/20231210115125/http://www.xuetr.com/
|
||||
- https://pentestlab.blog/2022/03/21/unconstrained-delegation/
|
||||
- https://www.cisa.gov/stopransomware/ransomware-guide
|
||||
- https://github.com/dsnezhkov/TruffleSnout/blob/7c2f22e246ef704bc96c396f66fa854e9ca742b9/TruffleSnout/Docs/USAGE.md
|
||||
- https://globetech.biz/index.php/2023/05/19/evading-edr-by-dll-sideloading-in-csharp/
|
||||
- https://www.youtube.com/watch?v=uSYvHUVU8xY
|
||||
- https://docs.github.com/en/repositories/creating-and-managing-repositories/transferring-a-repository
|
||||
- https://www.hexacorn.com/blog/2018/04/24/extexport-yet-another-lolbin/
|
||||
- https://www.huntress.com/blog/fake-browser-updates-lead-to-boinc-volunteer-computing-software
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/evolution-of-fin7/
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31324
|
||||
- https://www.hexacorn.com/blog/2020/08/23/odbcconf-lolbin-trifecta/
|
||||
- https://labs.nettitude.com/blog/introducing-sharpwsus/
|
||||
- https://www.elastic.co/security-labs/maas-appeal-an-infostealer-rises-from-the-ashes
|
||||
- https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
|
||||
- https://firecompass.com/crushftp-vulnerability-cve-2025-54309-securing-file-transfer-services/
|
||||
- https://github.com/CheraghiMilad/bypass-Neo23x0-auditd-config/blob/f1c478a37911a5447d5ffcd580f22b167bf3df14/sysinfo-syscall/README.md
|
||||
- https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/
|
||||
- https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/
|
||||
- https://www.security.com/threat-intelligence/blackbyte-exbyte-ransomware
|
||||
- https://www.linkedin.com/posts/huntress-labs_when-a-sketchy-incident-hits-your-network-activity-7304940371078238208-Th_l/?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAJTlRcB28IaUtg03HUU-IdliwzoAL1flGc
|
||||
- https://twitter.com/Kostastsale/status/1480716528421011458
|
||||
- https://web.archive.org/web/20220205033028/https://twitter.com/PythonResponder/status/1385064506049630211
|
||||
- https://github.com/0xthirteen/SharpMove/
|
||||
- https://www.bitdefender.com/en-us/blog/businessinsights/bitdefender-advisory-critical-unauthenticated-rce-windows-server-update-services-cve-2025-59287
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/398/event
|
||||
- https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/
|
||||
- https://docs.microsoft.com/en-us/windows/win32/api/minidumpapiset/nf-minidumpwritedump
|
||||
- https://redcanary.com/blog/threat-intelligence/intelligence-insights-october-2024/
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#service-principal-assigned-to-a-role
|
||||
- https://www.nextron-systems.com/2024/03/22/unveiling-kamikakabot-malware-analysis/
|
||||
- https://github.com/TwoSevenOneT/WSASS
|
||||
- https://learn.microsoft.com/en-us/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide
|
||||
- https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/
|
||||
- https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf
|
||||
- https://www.virustotal.com/gui/file/e96a0c1bc5f720d7f0a53f72e5bb424163c943c24a437b1065957a79f5872675
|
||||
- https://learn.microsoft.com/en-us/powershell/module/dism/enable-windowsoptionalfeature?view=windowsserver2022-ps
|
||||
- https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/
|
||||
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_system.html
|
||||
- https://news.ycombinator.com/item?id=29504755
|
||||
- https://harfanglab.io/insidethelab/uac-0057-pressure-ukraine-poland/
|
||||
- https://github.com/grayhatkiller/SharpExShell
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4661
|
||||
- https://www.microsoft.com/en-us/security/blog/2022/12/12/iis-modules-the-evolution-of-web-shells-and-how-to-detect-them/
|
||||
- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/
|
||||
- https://unit42.paloaltonetworks.com/chromeloader-malware/
|
||||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/d42db7d5-f141-4466-8f47-0a4be14e2fc1
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44546/44546-logid-event-config-attr
|
||||
- https://tria.ge/240521-ynezpagf56/behavioral1
|
||||
- https://thedfirreport.com/2024/04/29/from-icedid-to-dagon-locker-ransomware-in-29-days/
|
||||
- https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/
|
||||
- https://thedfirreport.com/2023/04/03/malicious-iso-file-leads-to-domain-wide-ransomware
|
||||
- https://www.pcrisk.com/removal-guides/31853-funklocker-funksec-ransomware
|
||||
- https://github.com/splunk/security_content/blob/7283ba3723551f46b69dfeb23a63b358afb2cb0e/lookups/browser_app_list.csv?plain=1
|
||||
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064518/Carbanak_APT_eng.pdf
|
||||
- https://www.hexacorn.com/blog/2018/09/02/beyond-good-ol-run-key-part-86/
|
||||
- https://learn.microsoft.com/en-us/windows/win32/debug/configuring-automatic-debugging
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4741
|
||||
- https://www.loobins.io/binaries/xattr/
|
||||
- https://www.deepwatch.com/labs/customer-advisory-fortios-ssl-vpn-vulnerability-cve-2022-42475-exploited-in-the-wild/
|
||||
- https://stackoverflow.com/questions/66011412/how-to-clear-a-event-log-in-powershell-7
|
||||
- https://cloud.google.com/logging/docs/audit/understanding-audit-logs
|
||||
- https://thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrusion/
|
||||
- https://blog.appsecco.com/kubernetes-namespace-breakout-using-insecure-host-path-volume-part-1-b382f2a6e216
|
||||
- https://tria.ge/241231-j9yatstqbm/behavioral1
|
||||
- https://about.gitlab.com/blog/gitlab-discovers-widespread-npm-supply-chain-attack/
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/333889629/config-firewall-policy
|
||||
- https://github.com/rtecCyberSec/BitlockMove
|
||||
- https://web.archive.org/web/20220319032520/https://blog.redbluepurple.io/offensive-research/bypassing-injection-detection
|
||||
- https://github.com/nasbench/Misc-Research/blob/2f651ede832ab34027a7ba005b63bb78f1ade378/Other/React-Next-Child-Processes-Notes.md
|
||||
- https://github.com/rtecCyberSec/SpeechRuntimeMove
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#non-compliant-device-sign-in
|
||||
- https://ss64.com/nt/set.html
|
||||
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053
|
||||
- https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
|
||||
- https://moonlock.com/amos-backdoor-persistent-access
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd299871(v=ws.10)
|
||||
- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode
|
||||
- https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/
|
||||
- https://jgspiers.com/audit-group-policy-changes/
|
||||
- https://www.huntress.com/blog/the-unwanted-guest
|
||||
- https://learn.microsoft.com/en-us/sql/t-sql/statements/alter-server-audit-transact-sql?view=sql-server-ver16
|
||||
- https://learn.microsoft.com/en-us/windows/compatibility/ntvdm-and-16-bit-app-support
|
||||
- https://github.com/netero1010/EDRSilencer/blob/0e73a7037ec65c52894d8208e6f605a7da0a34a6/EDRSilencer.c
|
||||
- https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/
|
||||
- https://www.microsoft.com/en-us/security/blog/2025/04/15/threat-actors-misuse-node-js-to-deliver-malware-and-other-malicious-payloads/
|
||||
- https://github.com/kh4sh3i/CVE-2025-32463/blob/81bb430f84fa2089224733c3ed4bfa434c197ad4/exploit.sh
|
||||
- https://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
|
||||
- https://www.vectra.ai/blog/undermining-microsoft-teams-security-by-mining-tokens
|
||||
- https://github.com/TwoSevenOneT/EDR-Freeze/blob/a7f61030b36fbde89871f393488f7075d2aa89f6/EDR-Freeze.cpp#L53
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4625
|
||||
- https://github.com/mulwareX/CVE-2025-6218-POC
|
||||
- https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis
|
||||
- https://www.linkedin.com/posts/mauricefielenbach_livingofftheland-redteam-persistence-activity-7344801774182051843-TE00/
|
||||
- https://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin
|
||||
- https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195
|
||||
- https://github.com/TwoSevenOneT/WSASS/blob/2c8fd9fa32143e7bc9f066e9511c6f8a57bc64b5/WSASS.cpp#L251
|
||||
- https://github.com/EvotecIT/TheDashboard/blob/481a9ce8f82f2fd55fe65220ee6486bae6df0c9d/Examples/RunReports/PingCastle.ps1
|
||||
- https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/security-log-events
|
||||
- https://informationsecuritybuzz.com/the-real-danger-behind-a-simple-windows-shortcut/
|
||||
- https://app.any.run/tasks/5c16b4db-4b36-4039-a0ed-9b09abff8be2
|
||||
- https://www.dsinternals.com/en/dpapi-backup-key-theft-auditing/
|
||||
- https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html
|
||||
- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
|
||||
- https://learn.microsoft.com/en-us/powershell/module/defender/set-mppreference
|
||||
- https://community.openvpn.net/openvpn/wiki/ManagingWindowsTAPDrivers
|
||||
- https://hunt.io/blog/macos-clickfix-applescript-terminal-phishing
|
||||
- https://redcanary.com/blog/threat-detection/process-masquerading/
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/dd526047b8c399c312fee47d1e6fb531164da54d/atomics/T1112/T1112.yaml#L790
|
||||
- https://man7.org/linux/man-pages/man2/syslog.2.html
|
||||
- https://www.virustotal.com/gui/search/behaviour_network%253A*.miningocean.org/files
|
||||
- https://bazaar.abuse.ch/browse/tag/one/
|
||||
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/List%20K8S%20secrets/
|
||||
- https://learn.microsoft.com/en-us/windows/win32/setupapi/run-and-runonce-registry-keys
|
||||
- https://www.elastic.co/guide/en/security/current/potential-non-standard-port-ssh-connection.html
|
||||
- https://learn.microsoft.com/en-us/sql/t-sql/statements/drop-table-transact-sql?view=sql-server-ver16
|
||||
- https://bazaar.abuse.ch/sample/5cb9876681f78d3ee8a01a5aaa5d38b05ec81edc48b09e3865b75c49a2187831/
|
||||
- https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf
|
||||
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
|
||||
- https://thedfirreport.com/2025/02/24/confluence-exploit-leads-to-lockbit-ransomware/
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/306021697/config-firewall-address
|
||||
- https://blog.checkpoint.com/research/filefix-the-new-social-engineering-attack-building-on-clickfix-tested-in-the-wild/
|
||||
- https://dear-territory-023.notion.site/WebDav-Share-Testing-e4950fa0c00149c3aa430d779b9b1d0f?pvs=4
|
||||
- https://hijacklibs.net/entries/microsoft/built-in/mpsvc.html
|
||||
- https://www.aon.com/cyber-solutions/aon_cyber_labs/linux-based-inter-process-code-injection-without-ptrace2/
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-failed-unusual-sign-ins
|
||||
- https://www.virustotal.com/gui/file/14d886517fff2cc8955844b252c985ab59f2f95b2849002778f03a8f07eb8aef
|
||||
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/getting-started-with-nftables_configuring-and-managing-networking
|
||||
- https://github.com/Ylianst/MeshAgent/blob/52cf129ca43d64743181fbaf940e0b4ddb542a37/modules/win-dispatcher.js#L173
|
||||
- https://research.splunk.com/endpoint/7215831c-8252-4ae3-8d43-db588e82f952
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#appid-uri-added-modified-or-removed
|
||||
- https://www.sans.org/blog/protecting-privileged-domain-accounts-lm-hashes-the-good-the-bad-and-the-ugly/
|
||||
- https://www.chrisfarris.com/post/effective-aws-ransomware/
|
||||
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Privileged%20container/
|
||||
- https://www.huntress.com/blog/silencing-the-edr-silencers
|
||||
- https://www.trendmicro.com/content/dam/trendmicro/global/en/research/24/b/lockbit-attempts-to-stay-afloat-with-a-new-version/technical-appendix-lockbit-ng-dev-analysis.pdf
|
||||
- https://kubernetes.io/docs/reference/config-api/apiserver-audit.v1/
|
||||
- https://research.splunk.com/endpoint/76406a0f-f5e0-4167-8e1f-337fdc0f1b0c/
|
||||
- https://docs.microsoft.com/en-us/windows/win32/etw/configuring-and-starting-an-autologger-session
|
||||
- https://gtfobins.github.io/gtfobins/gcc/#shell
|
||||
- https://web.archive.org/web/20230929023836/http://powershellhelp.space/commands/set-netfirewallrule-psv5.php
|
||||
- https://github.com/bobby-tablez/TTP-Threat-Feeds/blob/45398914e631f8372c3a9fbcd339ff65ffff1b17/results/2025/10/20251001-161956-trendmicro-atomic-macos-stealer-(amos).yml#L36
|
||||
- https://research.checkpoint.com/2025/stealth-falcon-zero-day/
|
||||
- https://twitter.com/th3_protoCOL/status/1536788652889497600
|
||||
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-are-being-activated-too-frequently
|
||||
- https://thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1021.001/T1021.001.md
|
||||
- https://linux.die.net/man/8/auditct
|
||||
- https://www.attackiq.com/2023/09/20/emulating-rhysida/
|
||||
- https://www.virustotal.com/gui/file/29837d0d3202758063185828c8f8d9e0b7b42b365c8941cc926d2d7c7bae2fb3
|
||||
- https://rapid7.com/blog/post/2019/02/19/stack-based-buffer-overflow-attacks-what-you-need-to-know/
|
||||
- https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Amazon%20Web%20Services/Analytic%20Rules/AWS_GuardDutyDisabled.yaml
|
||||
- https://github.com/TwoSevenOneT/EDR-Freeze
|
||||
- https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/
|
||||
- https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/
|
||||
- https://www.group-ib.com/resources/threat-research/red-curl-2.html
|
||||
- https://naikordian.github.io/blog/posts/brute-force-aws-console/
|
||||
- https://learn.microsoft.com/en-us/dotnet/framework/tools/regasm-exe-assembly-registration-tool
|
||||
- https://mrd0x.com/filefix-clickfix-alternative/
|
||||
- https://adsecurity.org/?p=1785
|
||||
- https://www.sentinelone.com/blog/exploiting-repos-6-ways-threat-actors-abuse-github-other-devops-platforms
|
||||
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion/
|
||||
- https://www.unicode.org/versions/Unicode5.2.0/ch02.pdf
|
||||
- https://learn.microsoft.com/en-us/mem/intune/apps/intune-management-extension
|
||||
- https://app.any.run/tasks/9a8fd563-4c54-4d0a-9ad8-1fe08339cbc3/
|
||||
- https://research.nccgroup.com/2018/11/22/turla-png-dropper-is-back/
|
||||
- https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucket.html
|
||||
- https://www.hexacorn.com/blog/2024/01/01/1-little-known-secret-of-hdwwiz-exe/
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/109120963/config-user-local
|
||||
- https://www.pentestpartners.com/security-blog/living-off-the-land-gpo-style/
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_arithmetic_operators?view=powershell-5.1
|
||||
- https://man7.org/linux/man-pages/man1/dmesg.1.html
|
||||
- https://restic.net/
|
||||
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
|
||||
- https://research.splunk.com/sources/5d8bd475-c8bc-4447-b27f-efa508728b90/
|
||||
- https://web.archive.org/web/20230329154538/https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html
|
||||
- https://unit42.paloaltonetworks.com/cve-2025-59287/
|
||||
- https://www.scpx.com.au/2025/11/16/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/
|
||||
- https://medium.com/@redfanatic7/running-kali-linux-on-windows-51ad95166e6e
|
||||
- https://web.archive.org/web/20231015205935/https://githubmemory.com/repo/FunctFan/JNDIExploit
|
||||
- https://www.security.com/threat-intelligence/medusa-ransomware-attacks
|
||||
- https://x.com/wietze/status/1958302556033065292?s=12
|
||||
- https://ponderthebits.com/2018/02/windows-rdp-related-event-logs-identification-tracking-and-investigation/
|
||||
- https://github.com/The-Viper-One/Invoke-PowerDPAPI/
|
||||
- https://x.com/Threatlabz/status/1879956781360976155
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/75fa21076dcefa348a7521403cdd6bfc4e88623c/atomics/T1082/T1082.md
|
||||
- https://learn.microsoft.com/en-us/entra/id-protection/howto-identity-protection-configure-mfa-policy
|
||||
- https://github.com/nasbench/Misc-Research/blob/fc46f6da34ff7e0076da28fd3e66d6e1100f1c2f/ETW/Microsoft-Windows-SMBClient.md
|
||||
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/applocker/what-is-applocker
|
||||
- https://man7.org/linux/man-pages/man2/personality.2.html
|
||||
- https://medium.com/@boutnaru/the-windows-foreniscs-journey-run-mru-run-dialog-box-most-recently-used-57375a02d724
|
||||
- https://any.run/report/6eea2773c1b4b5c6fb7c142933e220c96f9a4ec89055bf0cf54accdcde7df535/a407f006-ee45-420d-b576-f259094df091
|
||||
- https://nodejs.org/api/child_process.html#class-childprocess
|
||||
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Delete%20K8S%20events/
|
||||
- https://linux-audit.com/linux-aslr-and-kernelrandomize_va_space-setting/
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites
|
||||
- https://redfoxsec.com/blog/ipv6-dns-takeover/
|
||||
- https://outpost24.com/blog/crushftp-auth-bypass-vulnerability/
|
||||
- https://www.zerosalarium.com/2025/09/EDR-Freeze-Puts-EDRs-Antivirus-Into-Coma.html
|
||||
- https://blog.malwarebytes.com/malwarebytes-news/2021/02/lazyscripter-from-empire-to-double-rat/
|
||||
- https://fieldeffect.com/blog/grixba-play-ransomware-impersonates-sentinelone
|
||||
- https://hawktrace.com/blog/CVE-2025-59287-UNAUTH
|
||||
- https://support.kaspersky.com/KES4Linux/12.0.0/en-US/197929.htm
|
||||
- https://www.vaadata.com/blog/what-is-command-injection-exploitations-and-security-best-practices/
|
||||
- https://github.com/Arno0x/DNSExfiltrator/
|
||||
- https://research.ifcr.dk/certipy-4-0-esc9-esc10-bloodhound-gui-new-authentication-and-request-methods-and-more-7237d88061f7
|
||||
- https://docs.datadoghq.com/security/default_rules/719-39f-9cd/
|
||||
- https://www.hexacorn.com/blog/2024/10/12/the-sweet16-the-oldbin-lolbin-called-setup16-exe/
|
||||
- https://securitylabs.datadoghq.com/cloud-security-atlas/vulnerabilities/iam-user-without-mfa/
|
||||
- https://learn.microsoft.com/en-us/dotnet/api/system.diagnostics.eventing.reader.eventlogsession.clearlog?view=windowsdesktop-9.0&viewFallbackFrom=dotnet-plat-ext-5.0#System_Diagnostics_Eventing_Reader_EventLogSession_ClearLog_System_String_
|
||||
- http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
|
||||
- https://web.archive.org/web/20160727113019/https://answers.microsoft.com/en-us/protect/forum/mse-protect_scanning/microsoft-antimalware-has-removed-history-of/f15af6c9-01a9-4065-8c6c-3f2bdc7de45e
|
||||
- https://learn.microsoft.com/en-us/windows/win32/shell/shell-and-managed-code
|
||||
- https://www.joesandbox.com/analysis/1467354/0/html
|
||||
- https://www.electronjs.org/docs/latest/tutorial/native-code-and-electron
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd364427(v=ws.10)
|
||||
- https://learn.microsoft.com/en-us/troubleshoot/windows-client/installing-updates-features-roles/system-registry-no-backed-up-regback-folder
|
||||
- https://thecyberexpress.com/rogue-rdp-files-used-in-ukraine-cyberattacks/
|
||||
- https://cert.gov.ua/article/6284080
|
||||
- https://x.com/0x534c/status/1944694507787710685
|
||||
- https://www.intrinsec.com/alphv-ransomware-gang-analysis/?cn-reloaded=1
|
||||
- https://learn.microsoft.com/en-us/windows/win32/shell/launch
|
||||
- https://docs.stellarcyber.ai/5.2.x/Using/ML/Alert-Rule-Based-Potentially_Malicious_AWS_Activity.html
|
||||
- https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
|
||||
- https://www.synacktiv.com/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025
|
||||
- https://www.cyberciti.biz/faq/linux-remove-user-command/
|
||||
- https://learn.microsoft.com/en-us/windows/client-management/client-tools/quick-assist
|
||||
- https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html
|
||||
- https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise#migration
|
||||
- https://github.com/codewhitesec/SysmonEnte/blob/fe267690fcc799fbda15398243615a30451d9099/screens/1.png
|
||||
- https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
|
||||
- https://www.fortalicesolutions.com/posts/hiding-behind-the-front-door-with-azure-domain-fronting
|
||||
- https://ptsecurity.com/research/pt-esc-threat-intelligence/striking-panda-attacks-apt31-today
|
||||
- https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/
|
||||
- https://github.com/amidaware/tacticalrmm
|
||||
- https://github.com/0xBruno/WSUSploit.NET/tree/e239bce9d6b5f46a346e1e4c4d5e0a2a20d5c639
|
||||
- https://www.ired.team/offensive-security/lateral-movement/winrs-for-lateral-movement
|
||||
- https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-aws-guardduty-detector-is-enabled
|
||||
- https://www.esentire.com/security-advisories/netsupport-rat-clickfix-distribution
|
||||
- https://web.archive.org/web/20170909091934/https://blog.binarydefense.com/reliably-detecting-pass-the-hash-through-event-log-analysis
|
||||
- https://thedfirreport.com/2024/09/30/nitrogen-campaign-drops-sliver-and-ends-with-blackcat-ransomware/#exfiltration
|
||||
- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
|
||||
- https://ss64.com/osx/sw_vers.html
|
||||
- https://www.elastic.co/guide/en/security/current/unusual-file-modification-by-dns-exe.html
|
||||
- https://app.any.run/tasks/69c5abaa-92ad-45ba-8c53-c11e23e05d04/
|
||||
- https://thedfirreport.com/2025/09/08/blurring-the-lines-intrusion-shows-connection-with-three-major-ransomware-gangs/
|
||||
- https://sdmsoftware.com/general-stuff/launching-the-new-gp-management-editor-from-the-command-line/
|
||||
- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/
|
||||
- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-infrastructure
|
||||
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::IZ_UNCAsIntranet
|
||||
- http://www.hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/
|
||||
- https://learn.microsoft.com/en-us/windows/win32/vss/vshadow-tool-and-sample
|
||||
- https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/?123
|
||||
- https://intel.thedfirreport.com/eventReports/view/70
|
||||
- https://medium.com/@poudelswachchhanda123/preventing-lnk-and-fakecaptcha-threats-a-system-hardening-approach-2f7b7ed2e493
|
||||
- https://www.splunk.com/en_us/blog/security/you-bet-your-lsass-hunting-lsass-access.html
|
||||
- https://github.com/SigmaHQ/sigma/pull/5724#issuecomment-3466382234
|
||||
- https://vmois.dev/query-signal-desktop-messages-sqlite/
|
||||
- https://tria.ge/231212-r1bpgaefar/behavioral2
|
||||
- https://docs.aws.amazon.com/kms/latest/developerguide/ct-importkeymaterial.html
|
||||
- https://medium.com/@NullByteWht/hacking-macos-how-to-dump-1password-keepassx-lastpass-passwords-in-plaintext-723c5b1c311b
|
||||
- https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc#rds-modifydbinstance
|
||||
- https://help.fortinet.com/fsiem/Public_Resource_Access/7_4_0/rules/PH_RULE_AWS_GuardDuty_Detector_Deletion.htm
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-granted-highly-privileged-permissions
|
||||
- http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/
|
||||
- https://docs.aws.amazon.com/guardduty/latest/APIReference/API_UpdateDetector.html
|
||||
- https://x.com/JangPr0/status/1932034543026065833
|
||||
- https://www.virustotal.com/gui/file/f9710b0ba4de5fa0e7ec27da462d4d2fc6838eba83a19f23f6617a466bbad457
|
||||
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
|
||||
- https://www.sentinelone.com/blog/from-the-front-linesunsigned-macos-orat-malware-gambles-for-the-win/
|
||||
- https://www.hexacorn.com/blog/2023/12/31/1-little-known-secret-of-forfiles-exe/
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-credentials
|
||||
- https://www.hexacorn.com/blog/2023/06/07/this-lolbin-doesnt-exist/
|
||||
- https://docs.aws.amazon.com/kms/latest/developerguide/ct-deleteimportedkeymaterial.html
|
||||
- https://www.atomicredteam.io/atomic-red-team/atomics/T1048.003#atomic-test-8---python3-httpserver
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/
|
||||
- https://www.trendmicro.com/en_us/research/25/i/an-mdr-analysis-of-the-amos-stealer-campaign.html
|
||||
- https://expel.com/blog/cache-smuggling-when-a-picture-isnt-a-thousand-words/
|
||||
- https://web.archive.org/web/20230331181619/https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
|
||||
- https://www.safetycli.com/blog/shai-hulud-npm-attack-runs-malicious-github-action
|
||||
- https://docs.microsoft.com/en-us/sql/tools/bcp-utility
|
||||
- https://blog.axelarator.net/hunting-for-edr-freeze/
|
||||
- https://winaero.com/how-to-delete-scan-with-windows-defender-from-context-menu-in-windows-10/
|
||||
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#new-country
|
||||
- https://www.loobins.io/binaries/nscurl/
|
||||
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DeleteFlowLogs.html
|
||||
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
|
||||
- https://manpages.debian.org/unstable/ecasound/ecasound.1.en.html
|
||||
- https://github.com/rapid7/metasploit-framework/issues/11337
|
||||
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_vm.html
|
||||
- https://www.hexacorn.com/blog/2019/02/15/beyond-good-ol-run-key-part-103/
|
||||
- https://www.fortiguard.com/psirt/FG-IR-22-398
|
||||
- https://www.trendmicro.com/en_gb/research/22/e/uncovering-a-kingminer-botnet-attack-using-trend-micro-managed-x.html
|
||||
- https://sysdig.com/blog/detecting-and-mitigating-cve-2024-12084-rsync-remote-code-execution/
|
||||
- https://viz.greynoise.io/tags/hello-world-scraper-botnet?days=30
|
||||
- https://learn.microsoft.com/en-us/dotnet/api/system.diagnostics.eventlog.clear
|
||||
- https://www.cybertriage.com/artifact/terminalservices_remoteconnectionmanager_log/
|
||||
- https://www.bleepingcomputer.com/news/security/centrestack-rce-exploited-as-zero-day-to-breach-file-sharing-servers/
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/apt41-initiates-global-intrusion-campaign-using-multiple-exploits/
|
||||
- https://www.proofpoint.com/us/blog/threat-insight/phish-china-aligned-espionage-actors-ramp-up-taiwan-semiconductor-targeting
|
||||
- https://securelist.com/key-group-ransomware-samples-and-telegram-schemes/114025/
|
||||
- https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/
|
||||
- https://www.zscaler.fr/blogs/security-research/threat-actors-exploit-cve-2017-11882-deliver-agent-tesla
|
||||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts#assignment-and-elevation
|
||||
- https://www.kernel.org/doc/html/v4.10/_sources/admin-guide/sysrq.txt
|
||||
- https://suktech24.com/2025/07/17/aws-threat-detection-rule-guardduty-detector-disabled-or-suspended/
|
||||
- https://www.hexacorn.com/blog/2017/01/14/beyond-good-ol-run-key-part-53/
|
||||
- https://megatools.megous.com/
|
||||
- https://learn.microsoft.com/de-de/sysinternals/downloads/adexplorer
|
||||
- https://github.com/ossec/ossec-hids/blob/f6502012b7380208db81f82311ad4a1994d39905/etc/rules/syslog_rules.xml
|
||||
- https://research.checkpoint.com/2024/raspberry-robin-keeps-riding-the-wave-of-endless-1-days/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4673
|
||||
- https://www.zerosalarium.com/2025/09/Dumping-LSASS-With-WER-On-Modern-Windows-11.html
|
||||
- https://github.com/okta/workflows-templates/blob/1164f0eb71ce47c9ddc7d850e9ab87b5a2b42333/workflows/suspicious_activity_reported/readme.md
|
||||
- https://www.cyberciti.biz/faq/how-force-kill-process-linux/
|
||||
- https://adsecurity.org/?p=3377
|
||||
- https://fourcore.io/blogs/threat-hunting-browser-credential-stealing
|
||||
- https://learn.microsoft.com/en-us/windows/wsl/install
|
||||
- https://www.blackhillsinfosec.com/mitm6-strikes-again-the-dark-side-of-ipv6/
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#bitlocker-key-retrieval
|
||||
- https://app.any.run/tasks/ae3c4ded-fd6a-43ed-8215-ba0ba574ad33
|
||||
- https://blu.org/mhonarc/discuss/2001/04/msg00285.php
|
||||
- https://www.hexacorn.com/blog/2023/12/26/1-little-known-secret-of-runonce-exe-32-bit/
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/reset-computermachinepassword?view=powershell-5.1
|
||||
- https://cert.gov.ua/article/6277849
|
||||
- https://threatbook.io/blog/Analysis-of-APT-C-60-Attack-on-South-Korea
|
||||
- https://www.youtube.com/watch?v=52tAmVLg1KM&t=2070s
|
||||
- https://www.huntress.com/blog/gootloader-threat-detection-woff2-obfuscation
|
||||
- https://app.any.run/tasks/8901e2d5-0c5a-48ba-a8e9-10b5ed7e06f4
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/dnscmd
|
||||
- https://github.com/elastic/detection-rules/blob/main/rules/integrations/aws/defense_evasion_guardduty_detector_deletion.toml
|
||||
- https://www.geeksforgeeks.org/how-to-kill-processes-on-the-linux-desktop-with-xkill/
|
||||
- https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild/
|
||||
- http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
|
||||
- https://www.splunk.com/en_us/blog/security/threat-update-awfulshred-script-wiper.html
|
||||
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
|
||||
- https://medium.com/r3d-buck3t/red-teaming-in-cloud-leverage-azure-frontdoor-cdn-for-c2-redirectors-79dd9ca98178
|
||||
- https://www.broadcom.com/support/security-center/protection-bulletin/funksec-ransomware
|
||||
- https://www.virustotal.com/gui/file/54d60fd58d7fa3475fa123985bfc1594df26da25c1f5fbc7dfdba15876dd8ac5/behavior
|
||||
- https://gtfobins.github.io/gtfobins/curl/
|
||||
- https://wazuh.com/blog/how-to-detect-meshagent-with-wazuh/
|
||||
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#password-spray
|
||||
- https://strontic.github.io/xcyclopedia/library/dialer.exe-0B69655F912619756C704A0BF716B61F.html
|
||||
- https://reliaquest.com/blog/threat-spotlight-cve-2025-54309-crushftp-exploit/
|
||||
- https://www.zscaler.com/blogs/security-research/deepseek-lure-using-captchas-spread-malware
|
||||
- https://web.archive.org/web/20210629055600/https://github.com/hhlxf/PrintNightmare/
|
||||
- https://www.sentinelone.com/labs/ranzy-ransomware-better-encryption-among-new-features-of-thunderx-derivative/
|
||||
- https://www.group-ib.com/blog/apt41-world-tour-2021/
|
||||
- https://news.sophos.com/en-us/2025/08/26/velociraptor-incident-response-tool-abused-for-remote-access/
|
||||
- https://redcanary.com/blog/threat-intelligence/intelligence-insights-may-2025/
|
||||
- https://tria.ge/241015-l98snsyeje/behavioral2
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/set_1
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/unc3944-targets-saas-applications
|
||||
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/ec2/delete-flow-logs.html
|
||||
- https://apophis133.medium.com/powershell-script-tactical-rmm-installation-45afb639eff3
|
||||
- https://x.com/nas_bench/status/1868639048484425963
|
||||
- https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/
|
||||
- https://github.com/CoreyCBurton/DripLoaderNG
|
||||
- https://portswigger.net/daily-swig/vmware-horizon-under-attack-as-china-based-ransomware-group-targets-log4j-vulnerability
|
||||
- https://research.splunk.com/endpoint/3742ebfe-64c2-11eb-ae93-0242ac130002
|
||||
- https://ss64.com/nt/schtasks.html
|
||||
- https://www.huntress.com/blog/know-thy-enemy-a-novel-november-case-on-persistent-remote-access
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/390485493/config-system-admin
|
||||
- https://www.nccgroup.com/us/research-blog/lapsus-recent-techniques-tactics-and-procedures/
|
||||
- https://www.malwarebytes.com/blog/detections/pum-optional-nodispbackgroundpage
|
||||
- https://learn.microsoft.com/en-us/windows/win32/cimwin32prov/delete-method-in-class-win32-service
|
||||
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#atypical-travel
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/5ede8f21e42ebe37e0a6eff757dba60bcfa85859/atomics/T1547.001/T1547.001.md
|
||||
- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
|
||||
- http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
|
||||
- https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/
|
||||
- https://research.nccgroup.com/2018/03/10/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/
|
||||
- https://strontic.github.io/xcyclopedia/library/vbc.exe-A731372E6F6978CE25617AE01B143351.html
|
||||
- https://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
|
||||
- https://github.com/nasbench/EVTX-ETW-Resources/blob/f1b010ce0ee1b71e3024180de1a3e67f99701fe4/ETWProvidersManifests/Windows10/1903/W10_1903_Pro_20200714_18362.959/WEPExplorer/Microsoft-Windows-WindowsUpdateClient.xml
|
||||
- https://research.splunk.com/endpoint/395ed5fe-ad13-4366-9405-a228427bdd91/
|
||||
- https://news.sophos.com/en-us/2024/08/07/sophos-mdr-hunt-tracks-mimic-ransomware-campaign-against-organizations-in-india/
|
||||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731935(v=ws.11)
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/5f866ca4517e837c4ea576e7309d0891e78080a8/atomics/T1040/T1040.md#atomic-test-16---powershell-network-sniffing
|
||||
- https://x.com/Max_Mal_/status/1826179497084739829
|
||||
- https://unit42.paloaltonetworks.com/microsoft-cve-2025-59287/
|
||||
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-successful-unusual-sign-ins
|
||||
- https://www.coreycburton.com/blog/driploader-case-study
|
||||
- https://www.bleepingcomputer.com/news/security/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/
|
||||
- https://detect.fyi/hunting-fileless-malware-in-the-windows-registry-1339ccde00ad
|
||||
- https://man7.org/linux/man-pages/man2/sysinfo.2.html
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2025-2825
|
||||
- https://cardinalops.com/blog/living-off-winrm-abusing-complexity-in-remote-management/
|
||||
- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html
|
||||
- https://www.man7.org/linux/man-pages/man1/systemctl.1.html
|
||||
- https://learn.microsoft.com/en-us/sysinternals/downloads/autoruns
|
||||
- https://www.atomicredteam.io/atomic-red-team/atomics/T156001#atomic-test-46---aws---guardduty-suspension-or-deletion
|
||||
- https://www.securityhq.com/blog/malicious-isatap-tunneling-unearthed-on-windows-server/
|
||||
- https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/takeown
|
||||
- https://www.trendmicro.com/en_us/research/24/j/edrsilencer-disrupting-endpoint-security-solutions.html
|
||||
- https://medium.com/falconforce/soaphound-tool-to-collect-active-directory-data-via-adws-165aca78288c
|
||||
- https://web.archive.org/web/20230329163438/https://blog.menasec.net/2019/02/threat-hunting-5-detecting-enumeration.html
|
||||
- https://www.virustotal.com/gui/file/6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b
|
||||
- https://blogs.blackberry.com/en/2024/07/akira-ransomware-targets-the-latam-airline-industry
|
||||
- https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/
|
||||
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
|
||||
- https://learn.microsoft.com/en-us/sql/t-sql/statements/drop-database-transact-sql?view=sql-server-ver16
|
||||
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/assoc
|
||||
- https://gtfobins.github.io/gtfobins/capsh/#shell
|
||||
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Vshadow/
|
||||
- https://www.hackingarticles.in/defense-evasion-windows-event-logging-t1562-002/
|
||||
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/deployment/deploy-appcontrol-policies-with-memcm
|
||||
- https://docs.github.com/en/pages/getting-started-with-github-pages/creating-a-github-pages-site
|
||||
- https://www.jamf.com/blog/infostealers-pose-threat-to-macos/
|
||||
- https://www.atomicredteam.io/atomic-red-team/atomics/T1562.012
|
||||
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44547/44547-logid-event-config-objattr
|
||||
- https://github.com/varwara/CVE-2024-35250
|
||||
- https://awscli.amazonaws.com/v2/documentation/api/2.14.0/reference/account/enable-region.html
|
||||
- https://www.cyberciti.biz/faq/show-all-running-processes-in-linux/
|
||||
- https://x.com/Wietze/status/1933495426952421843
|
||||
- https://web.archive.org/web/20211001064856/https://github.com/snovvcrash/DInjector
|
||||
- https://x.com/defusedcyber/status/1971492272966598683
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1564.002/T1564.002.md#atomic-test-3---create-hidden-user-in-registry
|
||||
- https://cloud.google.com/blog/topics/threat-intelligence/alphv-ransomware-backup/
|
||||
- https://syedhasan010.medium.com/forensics-analysis-of-an-lnk-file-da68a98b8415
|
||||
- https://learn.microsoft.com/en-us/previous-versions/dotnet/framework/data/wcf/wcf-data-service-client-utility-datasvcutil-exe
|
||||
- https://docs.aws.amazon.com/guardduty/latest/APIReference/API_DeleteDetector.html
|
||||
- https://github.com/Lifailon/RSA/blob/rsa/Sources/RSA-1.4.1.ps1#L1468
|
||||
- https://www.hexacorn.com/blog/2024/01/06/1-little-known-secret-of-fondue-exe/
|
||||
|
||||
@@ -458,6 +458,7 @@ https://docs.aws.amazon.com/efs/latest/ug/API_DeleteFileSystem.html
|
||||
https://docs.aws.amazon.com/efs/latest/ug/API_DeleteMountTarget.html
|
||||
https://docs.aws.amazon.com/glue/latest/webapi/API_CreateDevEndpoint.html
|
||||
https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-kubernetes.html#privilegeescalation-kubernetes-privilegedcontainer
|
||||
https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_suspend-disable.html
|
||||
https://docs.aws.amazon.com/IAM/latest/APIReference/API_DeleteSAMLProvider.html
|
||||
https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateSAMLProvider.html
|
||||
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html
|
||||
@@ -489,6 +490,7 @@ https://docs.github.com/en/organizations/keeping-your-organization-secure/managi
|
||||
https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-two-factor-authentication-for-your-organization/requiring-two-factor-authentication-in-your-organization
|
||||
https://docs.github.com/en/organizations/managing-oauth-access-to-your-organizations-data/disabling-oauth-app-access-restrictions-for-your-organization
|
||||
https://docs.github.com/en/organizations/managing-organization-settings/transferring-organization-ownership
|
||||
https://docs.github.com/en/repositories/archiving-a-github-repository/archiving-repositories
|
||||
https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository
|
||||
https://docs.google.com/presentation/d/1dkrldTTlN3La-OjWtkWJBb4hVk6vfsSMBFBERs6R8zA/edit
|
||||
https://docs.google.com/spreadsheets/d/17pSTDNpa0sf6pHeRhusvWG6rThciE8CsXTSlDUAZDyo
|
||||
@@ -681,6 +683,7 @@ https://docs.microsoft.com/en-us/windows/win32/wmisdk/mofcomp
|
||||
https://docs.microsoft.com/fr-fr/windows-server/administration/windows-commands/fsutil-behavior
|
||||
https://docs.microsoft.com/pt-br/windows/win32/secauthz/sid-strings
|
||||
https://docs.nginx.com/nginx/admin-guide/monitoring/debugging/#enabling-core-dumps
|
||||
https://docs.oracle.com/cd/E19683-01/816-4883/6mb2joatd/index.html
|
||||
https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/scrcons-exe-rare-child-process.html
|
||||
https://docs.python.org/3/library/site.html
|
||||
https://docs.python.org/3/using/cmdline.html#cmdoption-c
|
||||
@@ -1047,6 +1050,7 @@ https://github.com/iadgov/Event-Forwarding-Guidance/tree/master/Events
|
||||
https://github.com/iagox86/dnscat2
|
||||
https://github.com/Immersive-Labs-Sec/nimbuspwn
|
||||
https://github.com/j00sean/SecBugs/tree/ff72d553f75d93e1a0652830c0f74a71b3f19c46/CVEs/CVE-2023-27363
|
||||
https://github.com/joaoviictorti/RustRedOps/tree/ce04369a246006d399e8c61d9fe0e6b34f988a49/Self_Deletion
|
||||
https://github.com/JoelGMSec/PSAsyncShell
|
||||
https://github.com/jpalanco/alienvault-ossim/blob/f74359c0c027e42560924b5cff25cdf121e5505a/os-sim/agent/src/ParserUtil.py#L951
|
||||
https://github.com/jpillora/chisel/
|
||||
@@ -1537,6 +1541,7 @@ https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1078.003/T10
|
||||
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1078.003/T1078.003.md#atomic-test-3---create-local-account-with-admin-privileges-using-sysadminctl-utility---macos
|
||||
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1078.003/T1078.003.md#atomic-test-5---add-a-newexisting-user-to-the-admin-group-using-dseditgroup-utility---macos
|
||||
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1486/T1486.md
|
||||
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1490/T1490.md#atomic-test-12---disable-time-machine
|
||||
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.004/T1562.004.md#atomic-test-24---set-a-firewall-rule-using-new-netfirewallrule
|
||||
https://github.com/redcanaryco/AtomicTestHarnesses/blob/7e1e4da116801e3d6fcc6bedb207064577e40572/TestHarnesses/T1218_SignedBinaryProxyExecution/InvokeRemoteFXvGPUDisablementCommand.ps1
|
||||
https://github.com/RhinoSecurityLabs/Aggressor-Scripts/tree/master/UACBypass
|
||||
@@ -2011,6 +2016,7 @@ https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/se
|
||||
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-5140
|
||||
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-6281
|
||||
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-6416
|
||||
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-6423
|
||||
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc959352(v=technet.10)
|
||||
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc960241(v=technet.10)?redirectedfrom=MSDN
|
||||
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd348773(v=ws.10)
|
||||
@@ -2038,6 +2044,7 @@ https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon#event-id-21-wmie
|
||||
https://learn.microsoft.com/en-us/troubleshoot/developer/browsers/security-privacy/ie-security-zones-registry-entries
|
||||
https://learn.microsoft.com/en-us/troubleshoot/windows-client/setup-upgrade-and-drivers/network-provider-settings-removed-in-place-upgrade
|
||||
https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/netsh-advfirewall-firewall-control-firewall-behavior
|
||||
https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing
|
||||
https://learn.microsoft.com/en-us/troubleshoot/windows-server/remote/remove-entries-from-remote-desktop-connection-computer
|
||||
https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled
|
||||
https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/prevent-windows-store-lm-hash-password
|
||||
@@ -2294,6 +2301,7 @@ https://man.openbsd.org/ssh_config#LocalCommand
|
||||
https://man.openbsd.org/ssh_config#ProxyCommand
|
||||
https://man7.org/linux/man-pages/man1/ncat.1.html
|
||||
https://man7.org/linux/man-pages/man1/passwd.1.html
|
||||
https://man7.org/linux/man-pages/man2/mknod.2.html
|
||||
https://man7.org/linux/man-pages/man7/bpf-helpers.7.html
|
||||
https://man7.org/linux/man-pages/man8/getcap.8.html
|
||||
https://man7.org/linux/man-pages/man8/kmod.8.html
|
||||
@@ -2444,6 +2452,7 @@ https://oddvar.moe/2018/04/27/gpscript-exe-another-lolbin-to-the-list/
|
||||
https://oddvar.moe/2018/09/06/persistence-using-universal-windows-platform-apps-appx/
|
||||
https://okta.github.io/okta-help/en/prod/Content/Topics/Security/threat-insight/configure-threatinsight-system-log.htm
|
||||
https://old.zeek.org/zeekweek2019/slides/bzar.pdf
|
||||
https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/
|
||||
https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
|
||||
https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
|
||||
https://outflank.nl/blog/2018/01/16/hunting-for-evil-detect-macros-being-executed/
|
||||
@@ -3266,6 +3275,7 @@ https://twitter.com/shutingrz/status/1469255861394866177?s=21
|
||||
https://twitter.com/splinter_code/status/1420546784250769408
|
||||
https://twitter.com/splinter_code/status/1483815103279603714
|
||||
https://twitter.com/splinter_code/status/1519075134296006662?s=12&t=DLUXH86WtcmG_AZ5gY3C6g
|
||||
https://twitter.com/standa_t/status/1808868985678803222
|
||||
https://twitter.com/StopMalvertisin/status/1648604148848549888
|
||||
https://twitter.com/stvemillertime/status/1024707932447854592
|
||||
https://twitter.com/subTee/status/1216465628946563073
|
||||
@@ -3361,6 +3371,7 @@ https://web.archive.org/web/20180718061628/https://securitybytes.io/blue-team-fu
|
||||
https://web.archive.org/web/20180725233601/https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
|
||||
https://web.archive.org/web/20190209154607/https://subt0x11.blogspot.com/2018/04/wmicexe-whitelisting-bypass-hacking.html
|
||||
https://web.archive.org/web/20190213114956/http://www.windowsinspired.com/understanding-the-command-line-string-and-arguments-received-by-a-windows-program/
|
||||
https://web.archive.org/web/20190710034152/https://github.com/zerosum0x0/CVE-2019-0708
|
||||
https://web.archive.org/web/20190720093911/http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/
|
||||
https://web.archive.org/web/20191023232753/https://twitter.com/Hexacorn/status/1187143326673330176
|
||||
https://web.archive.org/web/20200128160046/https://twitter.com/reegun21/status/1222093798009790464
|
||||
@@ -3396,6 +3407,7 @@ https://web.archive.org/web/20220830134315/https://content.fireeye.com/apt-41/rp
|
||||
https://web.archive.org/web/20221019044836/https://nsudo.m2team.org/en-us/
|
||||
https://web.archive.org/web/20221026202428/https://gist.github.com/code-scrap/d7f152ffcdb3e0b02f7f394f5187f008
|
||||
https://web.archive.org/web/20230208123920/https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
|
||||
https://web.archive.org/web/20230217071802/https://blooteem.com/march-2022
|
||||
https://web.archive.org/web/20230329153811/https://blog.menasec.net/2019/02/threat-huting-10-impacketsecretdump.html
|
||||
https://web.archive.org/web/20230329155141/https://blog.menasec.net/2019/03/threat-hunting-26-remote-windows.html
|
||||
https://web.archive.org/web/20230329170326/https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html
|
||||
@@ -3436,6 +3448,7 @@ https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-grou
|
||||
https://www.anomali.com/blog/probable-iranian-cyber-actors-static-kitten-conducting-cyberespionage-campaign-targeting-uae-and-kuwait-government-agencies
|
||||
https://www.anomali.com/blog/pulling-linux-rabbit-rabbot-malware-out-of-a-hat
|
||||
https://www.anquanke.com/post/id/226029
|
||||
https://www.anyviewer.com/help/remote-technical-support.html
|
||||
https://www.arxiv-vanity.com/papers/2008.04676/
|
||||
https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966
|
||||
https://www.atomicredteam.io/atomic-red-team/atomics/T1562.002#atomic-test-8---modify-event-log-channel-access-permissions-via-registry---powershell
|
||||
@@ -3444,6 +3457,7 @@ https://www.autoitscript.com/site/
|
||||
https://www.beyondtrust.com/blog/entry/okta-support-unit-breach
|
||||
https://www.binarydefense.com/analysis-of-hancitor-when-boring-begets-beacon
|
||||
https://www.binarydefense.com/resources/blog/icedid-gziploader-analysis/
|
||||
https://www.bitdefender.com/en-us/blog/businessinsights/shrinklocker-decryptor-from-friend-to-foe-and-back-again
|
||||
https://www.bitdefender.com/files/News/CaseStudies/study/262/Bitdefender-WhitePaper-An-APT-Blueprint-Gaining-New-Visibility-into-Financial-Threats-interactive.pdf
|
||||
https://www.bitdefender.com/files/News/CaseStudies/study/377/Bitdefender-Whitepaper-WMI-creat4871-en-EN-GenericUse.pdf
|
||||
https://www.blackhat.com/docs/asia-14/materials/Erickson/Asia-14-Erickson-Persist-It-Using-And-Abusing-Microsofts-Fix-It-Patches.pdf
|
||||
@@ -3582,6 +3596,7 @@ https://www.elastic.co/guide/en/security/current/windows-service-installed-via-a
|
||||
https://www.elastic.co/security-labs/a-peek-behind-the-bpfdoor
|
||||
https://www.elastic.co/security-labs/exploring-the-qbot-attack-pattern
|
||||
https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set
|
||||
https://www.elastic.co/security-labs/grimresource
|
||||
https://www.elastic.co/security-labs/Hunting-for-Suspicious-Windows-Libraries-for-Execution-and-Evasion
|
||||
https://www.elastic.co/security-labs/operation-bleeding-bear
|
||||
https://www.elastic.co/security-labs/stopping-vulnerable-driver-attacks
|
||||
|
||||
Reference in New Issue
Block a user