
CICADA8Research
@CICADA8Research
Followers
856
Following
23
Media
5
Statuses
27
Welcome to the official Twitter for CICADA8! Your premier destination for cutting-edge research and development in the cybersecurity field
Joined July 2024
Hi Friends! We continue our series of articles about RPC and impacket. In the second part, we looked at tools that can be used to analyze RPC servers, and also examined RPC security issues : ).
cicada-8.medium.com
How to find a RPC server on the system and how to secure that : )
0
33
78
Hello, friends! We started writing a series of articles about Impacket. This will be useful if you have long wanted to understand this tool and create your own tools for Coerce, Lateral Movement and other RPC Abuse :).
cicada-8.medium.com
Learn the basics of RPC, develop a client and server using C++
1
52
156
Read our new article about privilege escalation via SymLinks! You will learn how to abuse arbitrary deletion, copying, overwriting, we will show you a couple of tricks and teach you a new interesting way to bypass UAC :).
cicada-8.medium.com
How to achieve LPE in Windows via symlinks and how we wrote an exploit for Anydesk :)
1
18
57
Hi friends! We would like to share with you our new article in which we look at various non-standard ways to use ADCS certificates in Windows AD 🧐.
cicada-8.medium.com
What do with a certificate in a Windows AD environment? How to get the most out of a single pfx file? The answers are in article
0
21
59
Hi friends, Recently @mansk1es presented his research about LPE in AnyDesk (CVE-2024-12754). Our team developed a POC on this vulnerability😀. Check it here:.
0
61
191
▎SpyWare 2.0 🔍. Read our new research and learn about MS UIA technology. You will explore the depths of COM, graphical elements in Windows and spy on WhatsApp, Telegram, Slack, and Keepass. 🕵️♂️💻. Tool:.
github.com
COM ViewLogger — new malware keylogging technique. Contribute to CICADA8-Research/Spyndicapped development by creating an account on GitHub.
2
68
167
Hello everyone! Our team loves everything related to LPE exploits. However, there is no publicly available list on the web with fresh LPE exploits (2023-2024) for Windows. However, we do have such a list. And we are sharing it with you!.
github.com
Complete list of LPE exploits for Windows (starting from 2023) - MzHmO/Exploit-Street
8
151
485
Our new article about privilege escalation via vulnerable MSI files. All roads lead to NT AUTHORIRTY\SYSTEM :).
github.com
Analyse MSI files for vulnerabilities. Contribute to CICADA8-Research/MyMSIAnalyzer development by creating an account on GitHub.
0
5
9
Hi friends, we felt that the topic of in-memory payload execution was not covered enough, so we've collected our own notes and hacks that we use on pentests to execute in-memory (reflective) payloads. Enjoy reading!.
cicada-8.medium.com
Everything OSEP didn’t tell you. How to execute payloads in memory and bypass antivirus.
0
3
5
Process Injection is Dead. Long Live IHxHelpPaneServer . How can a user's session be abused without process injection, remotekrbrelay, tgsthief?. Read it in our new article:. POC:.
github.com
Process injection alternative. Contribute to CICADA8-Research/IHxExec development by creating an account on GitHub.
0
1
4
New article posted! 😀. From HTTP to RCE. How to leave backdoor in IIS . Read it here:.
cicada-8.medium.com
I will show the way of persistence on a target system using legitimate Microsoft product being Internet Information Services.
0
0
3