TOUHAMI KASBAOUI's repositories
CVE-2023-23397_EXPLOIT_0DAY
Exploit for the CVE-2023-23397
Elasticsearch-Exploit-CVE-2023-31419
Elasticsearch Stack Overflow Vulnerability
XWorm-Trojan
Exploit for the vulnerability null pointer derefrence to in XWorm RAT
Forcepoint-Stonesoft-VPN-Client-LPE-POC
Vertical privilege escalation from administrator to NT AUTHORITY\SYSTEM
pg-offensive-security
Box notes and results.
Citrix_Secure_Access_LPE_0DAY
This is the exploitation vulnerability for Citrix Secure Acccess
malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Valhalla, Malware Bazaar, ThreatFox, Triage and it is able to scan Android devices against VT and HA.
misp-galaxy
Clusters and elements to attach to MISP events or attributes (like threat actors)
blog
Public repo for HF blog posts
CAPEv2
Malware Configuration And Payload Extraction
community
Community modules for CAPE Sandbox
detection-rules
Rules for Elastic Security's detection engine
drakvuf-sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
elastic-agent
Elastic Agent - single, unified way to add monitoring for logs, metrics, and other types of data to a host.
elasticsearch
Free and Open, Distributed, RESTful Search Engine
KTmaniaScan
Deserve development and inspiration for some upcoming projects.
OpenUBA
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
protections-artifacts
Elastic Security detection content for Endpoint
restler-fuzzer
RESTler is the first stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services.
rules
Repository of yara rules
shellcommands
Plugin shellcommands pour GLPI
stack-docs
Elastic Stack Documentation
TwiTi
This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)
UAC_Exploit
Escalate as Administrator bypassing the UAC affecting administrator accounts only.