w0rk3r's Windows Hacking Library @windowshackinglibrary Channel on Telegram

w0rk3r's Windows Hacking Library

@windowshackinglibrary


Manual job, I'm not a bot ;)

@BlueTeamLibrary
@W0rk3r

w0rk3r's Windows Hacking Library (English)

Are you interested in enhancing your hacking skills specifically for Windows systems? Look no further than w0rk3r's Windows Hacking Library! This Telegram channel is dedicated to providing valuable resources, tutorials, and guides for aspiring ethical hackers and cybersecurity enthusiasts. Whether you are a beginner looking to learn the basics or an experienced professional wanting to expand your knowledge, this channel has something for everyone.nnThe channel is managed by a dedicated individual who goes by the username @w0rk3r. Unlike automated bots, @w0rk3r is a real person who manually curates the content to ensure quality and relevance. You can trust that the information shared in this library is accurate, up-to-date, and tailored specifically for Windows hacking.nnIn addition to @w0rk3r's expertise, the channel is also affiliated with @BlueTeamLibrary, a valuable resource for defensive cybersecurity strategies. By following both channels, you can gain a comprehensive understanding of both offensive and defensive tactics in the cybersecurity field.nnSo, who is w0rk3r's Windows Hacking Library for? It is for anyone interested in learning about hacking techniques, tools, and methodologies specifically for Windows operating systems. Whether you are a student, a professional, or simply curious about cybersecurity, this channel has the resources you need to take your skills to the next level.nnWhat can you expect to find in this library? From step-by-step tutorials on popular hacking tools to in-depth guides on vulnerability exploitation, this channel covers a wide range of topics related to Windows hacking. You can stay updated on the latest trends, tools, and techniques in the cybersecurity world, all in one convenient location.nnJoin w0rk3r's Windows Hacking Library today and start your journey towards becoming a skilled ethical hacker. With a real person behind the scenes curating the content, you can trust that you are getting accurate and valuable information to help you succeed in the world of cybersecurity. Don't miss out on this opportunity to expand your knowledge and enhance your hacking skills with w0rk3r's Windows Hacking Library!

w0rk3r's Windows Hacking Library

19 Apr, 13:46


The Windows Registry Adventure #2: A brief history of the feature

https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-2.html

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

18 Apr, 19:07


The Windows Registry Adventure #1: Introduction and research results

https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

16 Apr, 12:44


SeeSeeYouExec: Windows Session Hijacking via CcmExec

https://cloud.google.com/blog/topics/threat-intelligence/windows-session-hijacking-via-ccmexec

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

21 Mar, 11:54


Pwned by the Mail Carrier

> How MS Exchange on-premises compromises Active Directory and what organizations can do to prevent that.

https://posts.specterops.io/pwned-by-the-mail-carrier-0750edfad43b

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

19 Sep, 14:39


Inside Microsoft's plan to kill PPLFault

"In this research publication, we'll learn about upcoming improvements to the Windows Code Integrity subsystem that will make it harder for malware to tamper with Anti-Malware processes and other important security features."

https://www.elastic.co/security-labs/inside-microsofts-plan-to-kill-pplfault

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

18 Sep, 19:22


CVE-2023-38146: Arbitrary Code Execution via Windows Themes

https://exploits.forsale/themebleed/

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

07 Jun, 12:18


Windows Secrets Extraction: A Summary

https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

15 Mar, 11:12


I’ve Got a Golden Twinkle in My Eye

The Kerberos Ticket Granting Ticket (KRBTGT) account is one of the most important accounts in a Windows Active Directory (AD) domain. Once the KRBTGT account has been exposed to an attacker this can allow them to conduct the Golden Ticket (GT) attack, which can grant them persistence, unfettered access, and may allow for privilege escalation in AD. This talk will stress the importance of the KRBTGT account and why it is often a high value target (HVT) for attackers. A detailed examination of the GT attack and defence techniques will be demonstrated.

https://www.youtube.com/watch?v=ABd0dm8MbDo

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

15 Mar, 00:38


External Trusts Are Evil // Breaking Trust Transitivity

https://exploit.ph/external-trusts-are-evil.html

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

25 Jan, 17:03


At the Edge of Tier Zero: The Curious Case of the RODC

https://posts.specterops.io/at-the-edge-of-tier-zero-the-curious-case-of-the-rodc-ef5f1799ca06

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

21 Oct, 13:51


Fantastic Rootkits: And Where to Find Them (Part 1)

https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

12 Oct, 23:02


Analysing LastPass, Part 1

https://www.mdsec.co.uk/2022/10/analysing-lastpass-part-1

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

28 Apr, 01:58


KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).

https://github.com/Dec0ne/KrbRelayUp

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

28 Apr, 01:55


Group Policy Folder Redirection CVE-2021-26887

https://decoder.cloud/2022/04/27/group-policy-folder-redirection-cve-2021-26887

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

02 Mar, 14:19


Introducing the Golden GMSA Attack

https://www.semperis.com/blog/golden-gmsa-attack

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

09 Feb, 13:38


Exploring Windows UAC Bypasses: Techniques and Detection Strategies

https://elastic.github.io/security-research/whitepapers/2022/02/03.exploring-windows-uac-bypass-techniques-detection-strategies/article/

@BlueTeamLibrary

w0rk3r's Windows Hacking Library

02 Feb, 20:26


Sandboxing Antimalware Products for Fun and Profit

https://elastic.github.io/security-research/whitepapers/2022/02/02.sandboxing-antimalware-products-for-fun-and-profit/article

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

27 Jan, 17:24


Delegate to KRBTGT service

https://skyblue.team/posts/delegate-krbtgt

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

27 Jan, 13:04


AD CS: weaponizing the ESC7 attack

https://www.blackarrow.net/adcs-weaponizing-esc7-attack

@WindowsHackingLibrary

w0rk3r's Windows Hacking Library

24 Jan, 13:19


Windows Drivers Reverse Engineering Methodology

https://voidsec.com/windows-drivers-reverse-engineering-methodology

@WindowsHackingLibrary