
Mapping Deception Solutions With BloodHound OpenGraph – Configuration Manager
Deception and canary development implemented in SCCM can be used to alert upon cyber attacks and intrusions. This blog provides step by step guidance to implement deception solutions and use BloodHound OpenGraph for planning.
SpecterOpsOpening a file in GNU Emacs can trigger arbitrary code execution through version control (git), most requiring zero user interaction beyond the file open itself.
https://github.com/califio/publications/blob/main/MADBugs/vim-vs-emacs-vs-claude/Emacs.md
#infosec #cybersecurity #redteam #pentest #ai #emacs #claude

publications/MADBugs/vim-vs-emacs-vs-claude/Emacs.md at main · califio/publications
Publications from Calif. Contribute to califio/publications development by creating an account on GitHub.
GitHub
Vim tabpanel modeline escape affects Vim < 9.2.0272
Vim tabpanel modeline escape affects Vim < 9.2.0272
===================================================
Date: 30.03.2026
Severity: High
CVE: *not-yet-assigned*
CWE: Improper Neutralization of ...
GitHub
GitHub - nikaiw/VMkatz: Extract Windows credentials directly from VM memory snapshots and virtual disks
Extract Windows credentials directly from VM memory snapshots and virtual disks - nikaiw/VMkatz
GitHub
Default TLS Exclusions for Palo Alto Networks Firewalls
Default TLS Exclusions for Palo Alto Networks Firewalls - panw-exclusions.json
GistThis repo contains the design plan and runbook for using Claude Code to search for Java Deserialization Gadget chains.
https://github.com/atredispartners/llmchainhunter
#infosec #cybersecurity #redteam #pentest #ai #llm #opensource

GitHub - atredispartners/llmchainhunter: Leveraging LLM to generate Java deserialization chains
Leveraging LLM to generate Java deserialization chains - atredispartners/llmchainhunter
GitHubA project that loads .NET assemblies into memory within an IIS environment running in full‑trust mode. It uses reflective loading techniques to inject inside the memory space of the w3wp.exe worker pool process
https://github.com/zux0x3a/Phantom
#infosec #cybersecurity #redteam #pentest #windows

MacOS Redteam 3: Initial Access with DarwinOps PKG
State of the art:
Medium
GitHub - memN0ps/armory-rs: Rusty Armory - Beacon Object Files (BOFs) in Rust (Codename: Armory)
Rusty Armory - Beacon Object Files (BOFs) in Rust (Codename: Armory) - memN0ps/armory-rs
GitHubIt is possible as a low privileged user to parse the Windows event logs for any ASR exclusion
https://primusinterp.com/posts/WindowsASR/
#infosec #cybersecurity #redteam #pentest
Cheesing Microsoft Attack Surface Reduction rules
While working on varying engagements i have been messing with Microsoft Attack Surface Reduction (ASR) quite a bit, since clients often use it to make the life of adversaries(and red teamers) just a tad harder. While working on these engagements i have compiled some tips and tricks in order to bypass/evade some of the rules that ASR offers. In this post i will dive into what ASR is and some of tips and tricks that i often use to bypass/cheese my way around said rules… So strap in and lets get going with some basic ASR understanding.
. .\Primusinterp