776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 1 / 39
  • thumbnail
    GitHub - Macmod/godap: A complete terminal user interface (TUI) for LDAP.
    November 26, 2025 at 2:22:32 PM UTC * - permalink -
    QRCode
    - https://github.com/Macmod/godap
    godap ldap ad
  • thumbnail
    Simple script that fixes all InaccessibleObjectException or IllegalAccessError for ysoserial using Java 17 · GitHub
    November 20, 2025 at 9:00:36 AM UTC * - permalink -
    QRCode
    - https://gist.github.com/JorianWoltjer/5210e99c13189446ece5ffe3e9fe3d90
    ysoserial java 17
  • thumbnail
    Blue Team Training for SOC analysts and DFIR - CyberDefenders
    November 14, 2025 at 11:06:02 AM UTC * - permalink -
    QRCode
    - https://cyberdefenders.org/
    blueteam forensic chall
  • thumbnail
    yichuan-w/LEANN: RAG on Everything with LEANN. Enjoy 97% storage savings while running a fast, accurate, and 100% private RAG application on your personal device.
    October 13, 2025 at 2:23:31 PM UTC * - permalink -
    QRCode
    - https://github.com/yichuan-w/LEANN
    ia llm rag
  • thumbnail
    UprootSecurity Resources
    October 1, 2025 at 3:19:20 PM UTC * - permalink -
    QRCode
    - https://resources.uprootsecurity.com/xml-injection
    xxe payload local dtd
  • GitHub - sikumy/spearspray: Enhance Your Active Directory Password Spraying with User Intelligence.
    October 1, 2025 at 8:24:27 AM UTC * - permalink -
    QRCode
    - https://web.archive.org/web/20250821131936/https://github.com/sikumy/spearspray
    ad passpol spray
  • thumbnail
    DCOM Again: Installing Trouble - SpecterOps
    September 30, 2025 at 11:08:44 AM UTC * - permalink -
    QRCode
    - https://specterops.io/blog/2025/09/29/dcom-again-installing-trouble-lateral-movement-bof/
    dcom lateral bof
  • thumbnail
    Mimikatz – Active Directory & Azure AD/Entra ID Security
    September 22, 2025 at 8:04:29 AM UTC * - permalink -
    QRCode
    - https://adsecurity.org/?page_id=1821
    mimikatz guide
  • thumbnail
    Dissecting DCOM part 1
    September 20, 2025 at 8:29:02 PM UTC * - permalink -
    QRCode
    - https://www.synacktiv.com/en/publications/dissecting-dcom-part-1
    dcom com
  • thumbnail
    0xBugatti/myAwesome
    September 11, 2025 at 2:07:55 PM UTC * - permalink -
    QRCode
    - https://github.com/0xBugatti/myAwesome
    av edr bypass cetp
  • thumbnail
    Wh04m1001/CVE-2025-48799
    August 14, 2025 at 12:11:25 AM UTC * - permalink -
    QRCode
    - https://github.com/Wh04m1001/CVE-2025-48799
    lpe windows 2disk hdd disks
  • thumbnail
    de4dot/de4dot: .NET deobfuscator and unpacker.
    August 13, 2025 at 7:30:58 PM UTC * - permalink -
    QRCode
    - https://github.com/de4dot/de4dot
    dotnet cs confuserex obfuscation deobfuscation
  • Abusing Exclusions To Evade Detection | Dazzy Ddos
    function Get-DefenderExclusions {
        param (
            [string]$logName = "Microsoft-Windows-Windows Defender/Operational",
            [int]$eventID = 5007,
            [switch]$Path,
            [switch]$Process,
            [switch]$Extension
        )
    
        if (-not ($Path -or $Process -or $Extension)) {
            Write-Host "Please specify at least one type of exclusion to filter: -Path, -Process, -Extension."
            return
        }
    
        # Get all event logs with the specified Event ID
        $events = Get-WinEvent -LogName $logName -FilterXPath "*[System[(EventID=$eventID)]]" -ErrorAction SilentlyContinue
    
        if (-not $events) {
            Write-Host "No events found with Event ID $eventID in the $logName log."
            return
        }
    
        # Define the regex patterns for exclusion paths, extensions, and processes
        $patterns = @{
            Path = "HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Paths\\([^`"]+)"
            Extension = "HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Extensions\\([^`"]+)"
            Process = "HKLM\\SOFTWARE\\Microsoft\\Windows Defender\\Exclusions\\Processes\\([^`"]+)"
        }
    
        # Function to parse and return unique exclusions
        function Get-UniqueExclusions {
            param (
                [string]$pattern,
                [string]$exclusionType
            )
    
            $uniqueExclusions = @{}
            foreach ($event in $events) {
                $message = $event.Message
                if ($message -match $pattern) {
                    $exclusionDetail = $matches[1] -replace ' = 0x0.*$', '' -replace 'New value:', '' -replace '^\s+|\s+$', ''
                    if (-not $uniqueExclusions.ContainsKey($exclusionDetail) -or $event.TimeCreated -gt $uniqueExclusions[$exclusionDetail]) {
                        $uniqueExclusions[$exclusionDetail] = $event.TimeCreated
                    }
                }
            }
            return $uniqueExclusions.GetEnumerator() | Sort-Object Value -Descending | ForEach-Object {
                [PSCustomObject]@{
                    ExclusionDetail = $_.Key
                    TimeCreated = $_.Value
                }
            }
        }
    
        # Extract and display exclusions based on the provided arguments
        if ($Path) {
            Write-Host "Path Exclusions:"
            Get-UniqueExclusions -pattern $patterns.Path -exclusionType 'Path' | Format-Table -Property ExclusionDetail, TimeCreated -AutoSize -Wrap
        }
        if ($Process) {
            Write-Host "Process Exclusions:"
            Get-UniqueExclusions -pattern $patterns.Process -exclusionType 'Process' | Format-Table -Property ExclusionDetail, TimeCreated -AutoSize -Wrap
        }
        if ($Extension) {
            Write-Host "Extension Exclusions:"
            Get-UniqueExclusions -pattern $patterns.Extension -exclusionType 'Extension' | Format-Table -Property ExclusionDetail, TimeCreated -AutoSize -Wrap
        }
    }
    
    # Example usage:
    # Get-DefenderExclusions -Path -Process -Extension
    # Get-DefenderExclusions -Process
    August 12, 2025 at 12:45:27 PM UTC * - permalink -
    QRCode
    - https://dazzyddos.github.io/posts/Abusing_Exclusions_To_Evade_Detection/
    powershell defender evasion evade
  • thumbnail
    toxuin/mdns-tunneller: Tunnels two (or more) mDNS domains together
    August 11, 2025 at 2:54:08 PM UTC * - permalink -
    QRCode
    - https://github.com/toxuin/mdns-tunneller?tab=readme-ov-file
    mdns tunnel network
  • NHAS/reverse_ssh | DeepWiki

    deep wiki

    August 6, 2025 at 2:12:47 PM UTC * - permalink -
    QRCode
    - https://deepwiki.com/NHAS/reverse_ssh
    deep wiki github
  • thumbnail
    Persistence – COM Hijacking – Penetration Testing Lab
    July 31, 2025 at 3:29:02 PM UTC * - permalink -
    QRCode
    - https://pentestlab.blog/2020/05/20/persistence-com-hijacking/
    com hijack
  • thumbnail
    The Most Helpful PowerShell Cheat Sheet You’ll Ever Find
    July 31, 2025 at 9:53:27 AM UTC * - permalink -
    QRCode
    - https://www.stationx.net/powershell-cheat-sheet/
    powershell
  • Extracting BitLocker keys from a TPM
    July 22, 2025 at 3:03:04 PM UTC * - permalink -
    QRCode
    - https://pulsesecurity.co.nz/articles/TPM-sniffing
    bitlocker tpm sniffing
  • thumbnail
    (442) Breaking Bitlocker - Bypassing the Windows Disk Encryption - YouTube
    July 22, 2025 at 2:27:21 PM UTC * - permalink -
    QRCode
    - https://www.youtube.com/watch?v=wTl4vEednkQ
    bitlocker bypass
  • Companies hiring security remote | companies-hiring-security-remote
    June 30, 2025 at 12:26:03 PM UTC * - permalink -
    QRCode
    - https://edoardottt.github.io/companies-hiring-security-remote/
    security jobs full remote
Links per page: 20 50 100
◄Older
page 1 / 39
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation