IntruderPayloads
PEASS-ng
IntruderPayloads | PEASS-ng | |
---|---|---|
2 | 90 | |
3,526 | 14,960 | |
- | 1.8% | |
1.8 | 8.3 | |
over 2 years ago | 10 days ago | |
BlitzBasic | C# | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
IntruderPayloads
-
AI-powered Bing Chat spills its secrets via prompt injection attack
It's very interesting that AppSec may now begin to include "prompt injection" attacks as something of relevance.
Specifically with libraries like LangChain[0] that allow for you to perform complex actions ("What's the weather?" -> makes HTTP request to fetch weather) then we end up in a world where injection attacks can have side effects with security implications.
I've been thinking about what security might look like for a post-ChatGPT world and how I'd attempt to defend against it. I'd probably start by building a database of attack prompts, kind of like this[1] fuzz list but for AI, then I'd train a second neural net that acts like an adversarial neural network[2] to try to exploit the system based on those payloads. The end result would sort of like SQLMap[3] but for AI systems where it can automatically "leak" hidden prompts and potentially find "bypasses" to escape the sandbox.
Has anybody else spent any time thinking about how to defend systems against prompt injection attacks that have possible side effects (like making an HTTP request)?
0: https://langchain.readthedocs.io/en/latest/modules/agents/ex...
1: https://github.com/1N3/IntruderPayloads
2: https://en.wikipedia.org/wiki/Generative_adversarial_network
3: https://sqlmap.org/
-
Passed OSCP (70+10)! Experience sharing!
nmap, hacktricks and burpsuite are my best friend on enumeration. Search every port on hacktricks, fuzz every field in your web request on burpsuite using https://github.com/1N3/IntruderPayloads. Don't forget to try bruteforce if everything failed.
PEASS-ng
-
Great enumeration scripts?
Once on a system, something like Linpeas or Winpeas would be useful: https://github.com/carlospolop/PEASS-ng
-
HackersToolKit.co - One-Stop Shop for Tool Commands for CTFs, bug bounty, and Penetration Testing
Reject internet, embrace man. TBH it is not usefull at all, it is just in manual or embedded in kali, like basic webshells for example. It is cool to do such thing as a little free time project to learn about hosting and developing a website, but usefulnes for broader audience is minimal I think. For everyday use https://book.hacktricks.xyz are the best in my opinion.
-
Allowed tools for OSCP
I'm taking my OSCP exam next Wednesday and was just wondering on what tools are actually prohibited and which are not. I'm specifically referring to linpeas, winpeas, seatbelt. I often times run these tools when I've exausted my enumeration methods for a quick find. Are these tools allowed on the AD set and the individual machines?
-
Qualified to write a technical book ?
Seems like a cart before horse situation. Why not just release the cheat sheet you have now and see how it does? I like Carlos Polop's approach with HackTricks -- https://book.hacktricks.xyz/ -- he offers previews of new content to his patrons.
-
For cycle inside a list
Hi I don't understand the self.files attribute in this code: https://github.com/carlospolop/PEASS-ng/blob/master/linPEAS/builder/src/fileRecord.py
- LinPEAS
-
What are the alternative tools for wmic on cmd?
I'd recommend poking around at github and see what you find. A good starting point is WinPEAS if you're looking for automation. Seatbelt might also be helpful
- What are the alternatives for wmic on cmd?
- Need an ex OSCP candidate to share their experiences.
-
Hack The Box - Vessel [Hard] - Walkthrough
Using linpeas I found some useful information over the user steven
What are some alternatives?
ssti-payloads - 🎯 Server Side Template Injection Payloads
lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
sql-injection-payload-list - 🎯 SQL Injection Payload List
warp-plus-cloudflare - Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ ) [GET https://api.github.com/repos/ALIILAPRO/warp-plus-cloudflare: 403 - Repository access blocked]
vaf - Vaf is a cross-platform very advanced and fast web fuzzer written in nim
pimpmykali - Kali Linux Fixes for Newly Imported VM's
dicectf-2023-challenges - All challenges from DiceCTF 2023
CCStopper - [Archived] Stops Adobe's pesky background apps and more 😉
SQLMap - Automatic SQL injection and database takeover tool
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
GTFONow - Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
traitor - :arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock