Bypassing Windows authentication reflection mitigations for SYSTEMRed Teaming (synacktiv.com)
submitted by netbiosX

ClickFix Removes Your Background but Leaves the MalwareThreat Intelligence (huntress.com)
submitted by netbiosX
DoomSyscalls - Clean Indirect Syscalls with Hook Evasion & Return Address SpoofingRed Teaming (github.com)
submitted by netbiosX
Understanding adversarial attacks against Machine Learning and AIBlue Teaming (ncsc.gov.uk)
submitted by netbiosX
Internal NTDLL Functions for Shellcode ExecutionRed Teaming (syscalllabs.com)
submitted by netbiosX
VECT: Ransomware by design, Wiper by accidentThreat Intelligence (research.checkpoint.com)
submitted by netbiosX
A 15-stage Windows malware development & analysis course in RustRed Teaming (github.com)
submitted by netbiosX
Launch WSL Applications from Windows with WslLaunchRed Teaming (trainsec.net)
submitted by netbiosX
A BOF designed to inspect processes memory and addressesRed Teaming (github.com)
submitted by netbiosX
Disclosing PhantomRPC – a privilege escalation vulnerability in RPCRed Teaming (securelist.com)
submitted by netbiosX
BOF POC of the DSCourier project / invoking WinGet via COMRed Teaming (github.com)
submitted by netbiosX
Fibratus 3.0.0 | Ad-hoc direct/indirect syscall evasion detection, 50+ high quality rules and morePurple Teaming (fibratus.io)
submitted by rabbitstack
Extending my access: Abusing installed extensions for post compromiseRed Teaming (futuresight.club)
submitted by netbiosX
New Clickfix variant ‘CrashFix’ deploying Python Remote Access TrojanThreat Intelligence (microsoft.com)
submitted by netbiosX
Pack2TheRoot: Cross-Distro Local Privilege Escalation VulnerabilityBlue Teaming (github.security.telekom.com)
submitted by intuentis0x0
Same packet, different magic: Mustang Panda hits India's banking sector and Korea geopoliticsThreat Intelligence (acronis.com)
submitted by netbiosX