Link Dump 10/12/19
by admin
Saturday, October 12th, 2019 at 1:01 pm
https://github.com/h43z/dns-rebinding-tool/
 http://intx0x80.blogspot.com/2019/10/JWT.html
 https://twitter.com/kaluche_/status/1181834267204210688 
  https://github.com/Hackplayers/Salsa-tools 
 https://github.com/AlmondOffSec/PoCs/tree/master/Windows_wermgr_eop 
 https://github.com/HunnicCyber/SharpSniper 
 https://github.com/3gstudent/GadgetToJScript 
 https://github.com/ZeroPointSecurity/GoldenTicket 
 https://github.com/coolboy4me/cve-2019-0708_bluekeep_rce 
 https://github.com/bugbounty-site/exploits/tree/master/CVE-2019-14994 
Reading
 https://xz.aliyun.com/t/6498 
 https://thewover.github.io/Bear-Claw/ 
 https://blog.hunniccyber.com/phishing-with-netlify/ 
 https://www.preempt.com/blog/drop-the-mic-2-active-directory-open-to-more-ntlm-attacks/ 
 https://silentbreaksecurity.com/cve-2019-10617/ 
 https://www.nextron-systems.com/2019/10/04/antivirus-event-analysis-cheat-sheet-v1-7-2/ 
 https://jailbreak.fce365.info/Thread-It-s-possible-once-again-to-bypass-iCloud-by-using-a-CFW-with-the-CheckM8-Exploit?pid=1151#pid1151 
 https://offsec.almond.consulting/windows-error-reporting-arbitrary-file-move-eop.html 
 https://ssd-disclosure.com/archives/4033/ssd-advisory-openssh-pre-auth-xmss-integer-overflow 
 https://safebreach.com/Post/HP-Touchpoint-Analytics-DLL-Search-Order-Hijacking-Potential-Abuses-CVE-2019-6333