Web安全
Cookie Sandwich:新型HttpOnly Cookie窃取技术
https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique
CVE-2024-43468: 微软SCCM未认证SQL注入漏洞分析
https://github.com/synacktiv/CVE-2024-43468
https://www.synacktiv.com/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections
CVE-2024-46982:Next.js 缓存投毒漏洞及利用链分析
https://zhero-web-sec.github.io/research-and-things/nextjs-cache-and-chains-the-stale-elixir
Injectly:批量管理多个页面的JS脚本注入
https://github.com/lklynet/injectly
内网渗透
Intune攻击路径及红队技术综述
https://posts.specterops.io/intune-attack-paths-part-1-4ad1882c1811
ADCS攻击技术Cheatsheet
https://docs.google.com/spreadsheets/d/1E5SDC5cwXWz36rPP_TXhhAvTvqz2RGnMYXieu4ZHx64
利用WinRM的插件特性实现内网横向移动
https://falconforce.nl/exploring-winrm-plugins-for-lateral-movement/
终端对抗
Injectra:在zip、rar、docx、jpg等文件格式无损嵌入载荷
https://github.com/AnonKryptiQuz/Injectra
rust_template:支持exe和dll编译兼容sRDI的Rust项目模板
https://github.com/Teach2Breach/rust_template
dll2shellcode:将sRDI兼容的dll转换为shellcode
https://github.com/Teach2Breach/dll2shell
自定义CLR加载程序管理器实现无patch AMSI绕过
https://securityintelligence.com/x-force/being-a-good-clr-host-modernizing-offensive-net-tradecraft/
https://github.com/xforcered/Being-A-Good-CLR-Host
BetterNetLoader:使用硬件断点绕过ETW和AMSI的.NET加载器
https://github.com/racoten/BetterNetLoader
利用COM劫持技术攻陷AV/EDR
https://neodyme.io/en/blog/com_hijacking_1
https://github.com/neodyme-labs/38c3_com_talk
漏洞相关
CVE-2024-12084:Rsync文件同步工具漏洞POC
https://github.com/themirze/cve-2024-12084
CVE-2025-0411:7-Zip Web标记绕过漏洞POC
https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC
CVE-2025-21298:Windows OLE远程代码执行漏洞
https://github.com/ynwarcs/CVE-2025-21298
CVE-2024-55591:Fortinet FortiOS认证绕过漏洞POC
https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591
CVE-2024-49138:Windows clfs.sys内核提权漏洞POC
https://github.com/MrAle98/CVE-2024-49138-POC
BitLocker的降级攻击漏洞分析
https://neodyme.io/en/blog/bitlocker_screwed_without_a_screwdriver
云安全
利用窃取的m365 session横向移动到Azure DevOps
https://zolder.io/blog/devops-access-is-closer-than-you-assume/
Cognitohunter:AWS Cognito分析与session劫持工具
https://github.com/nullenc0de/Cognitohunter
人工智能和安全
raink:利用LLMs进行文档排名及漏洞识别方面应用
https://bishopfox.com/blog/raink-llms-document-ranking
https://github.com/BishopFox/raink
Google Gemini操作浏览器以绕过反机器人验证
https://github.com/byt3bl33d3r/gemini-web-navigator
其他
dyana:支持机器学习模型、Pickle与ELFs等格式的样本沙箱
https://github.com/dreadnode/dyana
针对Chrome浏览器扩展的定向供应链攻击,影响上万用户
https://blog.sekoia.io/targeted-supply-chain-attack-against-chrome-browser-extensions/
M01N Team公众号
聚焦高级攻防对抗热点技术
绿盟科技蓝军技术研究战队
官方攻防交流群
网络安全一手资讯
攻防技术答疑解惑
扫码加好友即可拉群
往期推荐