October 6, 2022 at 08:12PM

Tool VirusTotalC2: Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list. https://github.com/D1rkMtr/VirusTotalC2 https://t.me/cKure/11835

October 4, 2022 at 12:14PM

■■■□□ CVE-2022-41040 ffuf -w “urllist.txt:URL” -u “https://URL/autodiscover/autodiscover.json?@URL/&Email=autodiscover/autodiscover.json%3f@URL” -mr “IIS Web Core” -r 404 –> vulnerable Source: Twitter. https://t.me/cKure/11829

October 3, 2022 at 12:03PM

■■■■□ New unpatched Microsoft Exchange uero-Day under Active exploitation by state sponsored terrorists. The two vulnerabilities, which are formally yet to be assigned CVE identifiers, are being tracked by the Zero Day Initiative as ZDI-CAN-18333 (CVSS score: 8.8) and ZDI-CAN-18802 (CVSS score: 6.3). https://thehackernews.com/2022/09/warning-new-unpatched-microsoft.html https://www.zerodayinitiative.com/advisories/upcoming/ https://t.me/cKure/11826

October 3, 2022 at 11:55AM

■■■□□ An espionage-focused threat actor has been observed using a steganographic trick to conceal a previously undocumented backdoor in a Windows logo in its attacks against Middle Eastern governments. https://thehackernews.com/2022/04/experts-detail-3-hacking-teams-working.html https://thehackernews.com/2022/09/cyber-attacks-against-middle-east.html https://t.me/cKure/11825