每周蓝军技术推送(2025.1.4-1.10)
2025-1-10 10:7:0 Author: mp.weixin.qq.com(查看原文) 阅读量:2 收藏

Web安全

Cacheract:GitHub Actions缓存滥用及持久化攻击工具

https://adnanthekhan.com/2024/12/21/cacheract-the-monster-in-your-build-cache/

https://github.com/adnaneKhan/cacheract

DOMspy:Chrome扩展的DOM安全测试工具

https://github.com/GangGreenTemperTatum/DOMspy

使用 Selenium 和 Fireprox进行密码喷射

https://benkofman.com/2024/12/23/pwspraying.html

内网渗透

nfs-security-tooling:识别与利用NFS配置错误

https://www.hvs-consulting.de/en/nfs-security-identifying-and-exploiting-misconfigurations/

https://github.com/hvs-consulting/nfs-security-tooling

SCCMSiteCodeHunter:使用LDAP查询SCCM管理点和站点服务器

https://github.com/ZephrFish/SCCMSiteCodeHunter

DRSAT:在非域加入机器上运行MMC管理工具

https://github.com/CCob/DRSAT

SharpExShell:自动化Excel应用程序的DCOM横向移动技术

https://github.com/grayhatkiller/SharpExShell

终端对抗

Spyndicapped:利用MS UIA的键盘记录器

https://cicada-8.medium.com/im-watching-you-how-to-spy-windows-users-via-ms-uia-c9acd30f94c4

https://github.com/CICADA8-Research/Spyndicapped

VladimiRED:C#实现Mockingjay注入技术

https://github.com/kapellos/VladimiRED

sharp-execute:从非托管进程手动加载CLR执行.NET文件

https://github.com/NtDallas/sharp-execute

userland-exec:通过替换进程镜像实现隐蔽执行

https://github.com/hardenedlinux/userland-exec

DLLHound:基于PowerShell的DLL劫持漏洞检测工具

https://github.com/ajm4n/DLLHound

btexec:通过蓝牙设备认证执行Shellcode

https://github.com/djackreuter/btexec

Hannibal代理开发:低内存、可扩展的C2解决方案构建指南

https://silentwarble.com/blog/making-monsters-part-1/

漏洞相关

CVE-2024-30085:Windows Cloud Files驱动的缓冲区溢出利用分析

https://starlabs.sg/blog/2024/all-i-want-for-christmas-is-a-cve-2024-30085-exploit/

https://github.com/star-sg/CVE/tree/master/CVE-2024-30085

CVE-2024-43405:Nuclei漏洞绕过签名验证导致RCE风险

https://www.wiz.io/blog/nuclei-signature-verification-bypass

云安全

pht-payer-invariants:AWS管理账户安全不变性实现代码示例

https://www.chrisfarris.com/post/payer-invariants/

https://github.com/primeharbor/pht-payer-invariants

TokenSmith:生成Entra ID访问和刷新令牌

https://github.com/JumpsecLabs/TokenSmith

PoCEntraDeviceComplianceBypass:绕过Entra/Intune合规性策略访问控制政策

https://github.com/zh54321/PoCEntraDeviceComplianceBypass

AzurePwn.ps1:Azure云环境后渗透工具集合

https://github.com/LuemmelSec/Pentest-Tools-Collection/blob/main/tools/Azure/AzurePwn.ps1

aad-bofs:用于AzureAD攻击的BOF文件集合

https://github.com/kozmer/aad-bofs

2024年SaaS攻击报告:新型攻击技术与策略分析

https://pushsecurity.com/resources/book/saas-attacks-report/

人工智能和安全

LLM与GenAI安全解决方案全景 – Q1,2025

https://genai.owasp.org/resource/llm-and-generative-ai-security-solutions-landscape-q12025/ 

LLMs RAG 数据安全

https://www.illumidesk.com/blog/large-language-models-in-2025-enterprise-security 

使用LLMs和相似性搜索增强僵尸网络检测

https://www.rapid7.com/globalassets/_pdfs/research/llm-with-similarity-search-research.pdf

LLM4CVE:使用大型语言模型实现迭代自动漏洞修复

https://arxiv.org/html/2501.03446v1 

Blackfyre:开源二进制分析平台,集成AI/ML工具与API

https://github.com/jonescyber-ai/Blackfyre

MLOKit:攻击MLOps平台的工具包,利用REST API实施攻击

https://github.com/xforcered/MLOKit

2024年大型语言模型发展回顾与启示

https://simonwillison.net/2024/Dec/31/llms-in-2024/

LLM-PD:大型语言模型驱动的云安全主动防御代码库

https://github.com/SEU-ProactiveSecurity-Group/LLM-PD

网络安全与人工智能资源汇总

https://github.com/ksthk/one

社工钓鱼

跨IdP冒充:恶意IdP劫持SSO访问下游应用研究

https://pushsecurity.com/blog/cross-idp-impersonation/

其他

LitterBox:专为恶意软件开发和载荷测试设计的沙盒环境

https://github.com/BlackSnufkin/LitterBox

InstaTools:Ansible脚本自动安装各种安全测试工具

https://github.com/NocteDefensor/InstaTools

NachoVPN:恶意SSL-VPN服务器的概念验证与开发应用

https://github.com/AmberWolfCyber/NachoVPN

M01N Team公众号

聚焦高级攻防对抗热点技术

绿盟科技蓝军技术研究战队

官方攻防交流群

网络安全一手资讯

攻防技术答疑解惑

扫码加好友即可拉群

往期推荐

每周蓝军技术推送(2024.12.28-2025.1.3)

每周蓝军技术推送(2024.12.21-12.27)

每周蓝军技术推送(2024.12.14-12.20)


文章来源: https://mp.weixin.qq.com/s?__biz=MzkyMTI0NjA3OA==&mid=2247493958&idx=1&sn=fc9a1bbf6caf95a8b7e36393cad78eda&chksm=c1842957f6f3a0415494df511f9508dc96bd52859b394da2d476577ba2244cf005425fb0422e&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh