Web安全
Cacheract:GitHub Actions缓存滥用及持久化攻击工具
https://adnanthekhan.com/2024/12/21/cacheract-the-monster-in-your-build-cache/
https://github.com/adnaneKhan/cacheract
DOMspy:Chrome扩展的DOM安全测试工具
https://github.com/GangGreenTemperTatum/DOMspy
使用 Selenium 和 Fireprox进行密码喷射
https://benkofman.com/2024/12/23/pwspraying.html
内网渗透
nfs-security-tooling:识别与利用NFS配置错误
https://www.hvs-consulting.de/en/nfs-security-identifying-and-exploiting-misconfigurations/
https://github.com/hvs-consulting/nfs-security-tooling
SCCMSiteCodeHunter:使用LDAP查询SCCM管理点和站点服务器
https://github.com/ZephrFish/SCCMSiteCodeHunter
DRSAT:在非域加入机器上运行MMC管理工具
https://github.com/CCob/DRSAT
SharpExShell:自动化Excel应用程序的DCOM横向移动技术
https://github.com/grayhatkiller/SharpExShell
终端对抗
Spyndicapped:利用MS UIA的键盘记录器
https://cicada-8.medium.com/im-watching-you-how-to-spy-windows-users-via-ms-uia-c9acd30f94c4
https://github.com/CICADA8-Research/Spyndicapped
VladimiRED:C#实现Mockingjay注入技术
https://github.com/kapellos/VladimiRED
sharp-execute:从非托管进程手动加载CLR执行.NET文件
https://github.com/NtDallas/sharp-execute
userland-exec:通过替换进程镜像实现隐蔽执行
https://github.com/hardenedlinux/userland-exec
DLLHound:基于PowerShell的DLL劫持漏洞检测工具
https://github.com/ajm4n/DLLHound
btexec:通过蓝牙设备认证执行Shellcode
https://github.com/djackreuter/btexec
Hannibal代理开发:低内存、可扩展的C2解决方案构建指南
https://silentwarble.com/blog/making-monsters-part-1/
漏洞相关
CVE-2024-30085:Windows Cloud Files驱动的缓冲区溢出利用分析
https://starlabs.sg/blog/2024/all-i-want-for-christmas-is-a-cve-2024-30085-exploit/
https://github.com/star-sg/CVE/tree/master/CVE-2024-30085
CVE-2024-43405:Nuclei漏洞绕过签名验证导致RCE风险
https://www.wiz.io/blog/nuclei-signature-verification-bypass
云安全
pht-payer-invariants:AWS管理账户安全不变性实现代码示例
https://www.chrisfarris.com/post/payer-invariants/
https://github.com/primeharbor/pht-payer-invariants
TokenSmith:生成Entra ID访问和刷新令牌
https://github.com/JumpsecLabs/TokenSmith
PoCEntraDeviceComplianceBypass:绕过Entra/Intune合规性策略访问控制政策
https://github.com/zh54321/PoCEntraDeviceComplianceBypass
AzurePwn.ps1:Azure云环境后渗透工具集合
https://github.com/LuemmelSec/Pentest-Tools-Collection/blob/main/tools/Azure/AzurePwn.ps1
aad-bofs:用于AzureAD攻击的BOF文件集合
https://github.com/kozmer/aad-bofs
2024年SaaS攻击报告:新型攻击技术与策略分析
https://pushsecurity.com/resources/book/saas-attacks-report/
人工智能和安全
LLM与GenAI安全解决方案全景 – Q1,2025
https://genai.owasp.org/resource/llm-and-generative-ai-security-solutions-landscape-q12025/
LLMs RAG 数据安全
https://www.illumidesk.com/blog/large-language-models-in-2025-enterprise-security
使用LLMs和相似性搜索增强僵尸网络检测
https://www.rapid7.com/globalassets/_pdfs/research/llm-with-similarity-search-research.pdf
LLM4CVE:使用大型语言模型实现迭代自动漏洞修复
https://arxiv.org/html/2501.03446v1
Blackfyre:开源二进制分析平台,集成AI/ML工具与API
https://github.com/jonescyber-ai/Blackfyre
MLOKit:攻击MLOps平台的工具包,利用REST API实施攻击
https://github.com/xforcered/MLOKit
2024年大型语言模型发展回顾与启示
https://simonwillison.net/2024/Dec/31/llms-in-2024/
LLM-PD:大型语言模型驱动的云安全主动防御代码库
https://github.com/SEU-ProactiveSecurity-Group/LLM-PD
网络安全与人工智能资源汇总
https://github.com/ksthk/one
社工钓鱼
跨IdP冒充:恶意IdP劫持SSO访问下游应用研究
https://pushsecurity.com/blog/cross-idp-impersonation/
其他
LitterBox:专为恶意软件开发和载荷测试设计的沙盒环境
https://github.com/BlackSnufkin/LitterBox
InstaTools:Ansible脚本自动安装各种安全测试工具
https://github.com/NocteDefensor/InstaTools
NachoVPN:恶意SSL-VPN服务器的概念验证与开发应用
https://github.com/AmberWolfCyber/NachoVPN
M01N Team公众号
聚焦高级攻防对抗热点技术
绿盟科技蓝军技术研究战队
官方攻防交流群
网络安全一手资讯
攻防技术答疑解惑
扫码加好友即可拉群
往期推荐