mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-10-01 07:45:36 -04:00
259 lines
11 KiB
Markdown
259 lines
11 KiB
Markdown
# My Awesome
|
|
|
|
[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
|
|
[![travis-banner](https://travis-ci.org/pe3zx/my-awesome.svg?branch=master)](https://travis-ci.org/pe3zx/my-awesome)
|
|
|
|
My curated list of awesome links, resources and tools
|
|
|
|
- [My Awesome](#my-awesome)
|
|
- [Articles](#article)
|
|
- [Malware Analysis](#malware-analysis)
|
|
- [Tools](#tools)
|
|
- [AWS Security](#aws-security)
|
|
- [Binary Analysis](#binary-analysis)
|
|
- [Digital Forensics and Incident Response](#digital-forensics-and-incident-response)
|
|
- [Exploits](#exploits)
|
|
- [Social Engineering](#social-engineering)
|
|
|
|
---
|
|
|
|
## Articles
|
|
|
|
### Malware Analysis
|
|
|
|
- CCleaner's backdoor analysis
|
|
- [Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor](https://www.crowdstrike.com/blog/protecting-software-supply-chain-deep-insights-ccleaner-backdoor/)
|
|
- [In-Depth Analysis of the CCleaner Backdoor Stage 2 Dropper and Its Payload](https://www.crowdstrike.com/blog/in-depth-analysis-of-the-ccleaner-backdoor-stage-2-dropper-and-its-payload/)
|
|
- List of interesting Windows APIs used by malware
|
|
|
|
<table>
|
|
<tr>
|
|
<td>WNetAddConnection</td>
|
|
<td>The WNetAddConnection function enables the calling application to connect a local device to a network resource. A successful connection is persistent, meaning that the system automatically restores the connection during subsequent logon operations. An example of malware that implement this function can be found below:
|
|
<ul>
|
|
<li><a href="https://securityintelligence.com/new-banking-trojan-icedid-discovered-by-ibm-x-force-research/">Icedid trojan in its network propagation function</a></li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
</table>
|
|
|
|
## Tools
|
|
|
|
### AWS Security
|
|
|
|
*Open source projects related to AWS security.*
|
|
|
|
<table>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/airbnb/BinaryAlert" target="_blank">airbnb/BinaryAlert</a>
|
|
</td>
|
|
<td>
|
|
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/cloudsploit/scans" target="_blank">cloudsploit/scans</a>
|
|
</td>
|
|
<td>
|
|
AWS security scanning checks
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/nccgroup/Scout2" target="_blank">nccgroup/Scout2</a>
|
|
</td>
|
|
<td>
|
|
Security auditing tool for AWS environments
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/Netflix/security_monkey" target="_blank">Netflix/security_monkey</a>
|
|
</td>
|
|
<td>
|
|
Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations.
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/Alfresco/prowler" target="_blank">Alfresco/prowler</a>
|
|
</td>
|
|
<td>
|
|
Tool for AWS security assessment, auditing and hardening. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark.
|
|
</td>
|
|
</tr>
|
|
</table>
|
|
|
|
### Binary Analysis
|
|
|
|
*Binary analysis tools, including decompilers, deobfuscators, disassemblers, etc.*
|
|
|
|
<table>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/fireeye/flare-floss">fireeye/flare-floss</a>
|
|
</td>
|
|
<td>
|
|
FireEye Labs Obfuscated String Solver - Automatically extract obfuscated strings from malware.
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/katjahahn/PortEx" target="_blank">katjahahn/PortEx</a>
|
|
</td>
|
|
<td>
|
|
Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/williballenthin/python-idb">williballenthin/python-idb</a>
|
|
</td>
|
|
<td>
|
|
Pure Python parser and analyzer for IDA Pro database files (.idb).
|
|
</td>
|
|
</tr>
|
|
</table>
|
|
|
|
### Digital Forensics and Incident Response
|
|
|
|
*Open source projects related to DFIR topic.*
|
|
|
|
<table>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/Invoke-IR/PowerForensics">Invoke-IR/PowerForensics</a>
|
|
</td>
|
|
<td>
|
|
PowerForensics provides an all in one platform for live disk forensic analysis
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/nannib/Imm2Virtual">nannib/Imm2Virtual</a>
|
|
</td>
|
|
<td>
|
|
This is a GUI (for Windows 64 bit) for a procedure to virtualize your EWF(E01), DD(Raw), AFF disk image file without converting it, directly with VirtualBox, forensically proof.
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/nshalabi/SysmonTools">nshalabi/SysmonTools</a>
|
|
</td>
|
|
<td>
|
|
Utilities for Sysmon (Sysmon View and Sysmon Shell)
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/THIBER-ORG/userline">THIBER-ORG/userline</a>
|
|
</td>
|
|
<td>
|
|
Query and report user logons relations from MS Windows Security Events
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/TryCatchHCF/DumpsterFire">TryCatchHCF/DumpsterFire</a>
|
|
</td>
|
|
<td>
|
|
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequence…
|
|
</td>
|
|
</tr>
|
|
</table>
|
|
|
|
### Exploits
|
|
|
|
*Interesting exploits. For research purpose only*
|
|
|
|
<table>
|
|
<tr>
|
|
<td>CVE-2016-7255</td>
|
|
<td>The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
|
|
<ul>
|
|
<li><a href="https://github.com/IOActive/I-know-where-your-page-lives">IOActive/I-know-where-your-page-lives</a></li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>CVE-2017-5123</td>
|
|
<td>The `waitid` implementation in upstream kernels did not restrict the target destination to copy information results. This can allow local users to write to otherwise protected kernel memory, which can lead to privilege escalation.
|
|
<ul>
|
|
<li><a href="https://github.com/nongiach/CVE/tree/master/CVE-2017-5123">nongiach/CVE</a></li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>CVE-2017-7089</td>
|
|
<td>
|
|
A logic issue existed in the handling of the parent-tab. This issue was addressed with improved state management. Processing maliciously crafted web content may lead to universal cross site scripting.
|
|
<ul>
|
|
<li><a href="https://github.com/Bo0oM/CVE-2017-7089">Bo0oM/CVE-2017-7089</a></li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>CVE-2017-7115</td>
|
|
<td>
|
|
The exploit achieves R/W access to the host's physical memory. The password for the archive is "one_ring". This exploit has been tested on the iPhone 7, iOS 10.2 (14C92). To run the exploit against different devices or versions, the symbols must be adjusted.
|
|
<ul>
|
|
<li><a href="https://bugs.chromium.org/p/project-zero/issues/detail?id=1317#c3">Apple: Multiple Race Conditions in PCIe Message Ring protocol leading to OOB Write and OOB Read</a></li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>CVE-2017-86464</td>
|
|
<td>Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability."
|
|
<ul>
|
|
<li><a href="https://www.exploit-db.com/exploits/42429/">CVE-2017-8464 - Microsoft Windows - '.LNK' Shortcut File Code Execution</a></li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td>CVE-2017-8759</td>
|
|
<td>Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
|
|
<ul>
|
|
<li><a href="https://github.com/fupinglee/MyPython/blob/master/exploit/CVE-2017-8759/CVE-2017-8759_exploit_rtf.py">MyPython/exploit/CVE-2017-8759/CVE-2017-8759_exploit_rtf.py</a></li>
|
|
<li><a href="https://github.com/vysec/CVE-2017-8759">vysec/CVE-2017-8759</a></li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td><a href="https://github.com/FriendsOfPHP/security-advisories">FriendsOfPHP/security-advisories</a></td>
|
|
<td>The PHP Security Advisories Database references known security vulnerabilities in various PHP projects and libraries. This database must not serve as the primary source of information for security issues, it is not authoritative for any referenced software, but it allows to centralize information for convenience and easy consumption.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><a href="https://github.com/ScottyBauer/Android_Kernel_CVE_POCs">ScottyBauer/Android_Kernel_CVE_POCs</a></td>
|
|
<td>A list of my CVE's with POCs</td>
|
|
</tr>
|
|
<tr>
|
|
<td><a href="https://github.com/spencerdodd/kernelpop">spencerdodd/kernelpop</a></td>
|
|
<td>Kernel privilege escalation enumeration and exploitation framework</td>
|
|
</tr>
|
|
<tr>
|
|
<td><a href="https://github.com/victims/victims-cve-db">victims/victims-cve-db</a></td>
|
|
<td>This database contains information regarding CVE(s) that affect various language modules. We currently store version information corresponding to respective modules as understood by select sources.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><a href="https://github.com/xairy/kernel-exploits">xairy/kernel-exploits</a></td>
|
|
<td>A bunch of proof-of-concept exploits for the Linux kernel</td>
|
|
</tr>
|
|
</table>
|
|
|
|
### Social Engineering
|
|
|
|
*Tools related to social engineering attack and human hacking*
|
|
|
|
<table>
|
|
<tr>
|
|
<td>
|
|
<a href="https://github.com/UndeadSec/EvilURL">Undeadsec/EvilURL</a>
|
|
</td>
|
|
<td>
|
|
An unicode domain phishing generator for IDN Homograph Attack
|
|
</td>
|
|
</tr>
|
|
</table>
|