Skip to content

Commit 85a3490

Browse files
authored
chore: archive new rule references and update cache file
1 parent d577872 commit 85a3490

2 files changed

Lines changed: 76 additions & 79 deletions

File tree

.github/latest_archiver_output.md

Lines changed: 73 additions & 79 deletions
Original file line numberDiff line numberDiff line change
@@ -1,108 +1,102 @@
11
# Reference Archiver Results
22

3-
Last Execution: 2023-11-15 01:55:35
3+
Last Execution: 2023-12-01 01:52:33
44

55
### Archiver Script Results
66

77

88
#### Newly Archived References
99

10-
- https://github.com/AliBrTab/CVE-2023-46747-POC/tree/main
10+
N/A
1111

1212
#### Already Archived References
1313

14-
- https://posts.specterops.io/application-whitelisting-bypass-and-arbitrary-unsigned-code-execution-technique-in-winrm-vbs-c8c24fb40404
15-
- https://www.virustotal.com/gui/file/b6e8910fb9b3bb1fcddefd35ff0ed8624930d30d6977e11808c8330415685a62
16-
- https://www.virustotal.com/gui/file/72f1a5476a845ea02344c9b7edecfe399f64b52409229edaf856fcb9535e3242
17-
- https://lolbas-project.github.io/lolbas/Binaries/msedge_proxy/
18-
- https://github.com/0xorOne/nuclei-templates/blob/2fef4270ec6e5573d0a1732cb18bcfc4b1580a88/http/cves/2023/CVE-2023-46747.yaml
19-
- https://learn.microsoft.com/en-us/office/vba/api/excel.xlmsapplication
20-
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
21-
- https://community.f5.com/t5/technical-forum/running-bash-commands-via-rest-api/td-p/272516
22-
- https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification
14+
- https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662
15+
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Msxsl/
16+
- https://www.huntress.com/blog/confluence-to-cerber-exploitation-of-cve-2023-22518-for-ransomware-deployment
2317

2418
#### Error While Archiving References
2519

26-
- https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html
27-
- https://news.ycombinator.com/item?id=29504755
28-
- https://us-cert.cisa.gov/ncas/alerts/aa21-008a
29-
- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/
30-
- https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/
20+
- https://www.hexacorn.com/blog/2019/02/15/beyond-good-ol-run-key-part-103/
3121
- https://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin
32-
- https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195
33-
- https://us-cert.cisa.gov/ncas/alerts/aa21-259a
34-
- http://www.hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/
35-
- http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
36-
- https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/
37-
- https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/
38-
- https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
39-
- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
40-
- https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
41-
- https://www.cyberciti.biz/faq/linux-remove-user-command/
42-
- https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/
43-
- http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
44-
- https://paper.seebug.org/1495/
45-
- http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
22+
- https://news.ycombinator.com/item?id=29504755
23+
- https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/
4624
- https://megatools.megous.com/
47-
- https://www.hexacorn.com/blog/2018/09/02/beyond-good-ol-run-key-part-86/
25+
- https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/
26+
- https://www.sans.org/cyber-security-summit/archives
27+
- https://www.hexacorn.com/blog/2020/08/23/odbcconf-lolbin-trifecta/
4828
- https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
49-
- http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/
50-
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
51-
- https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html
29+
- https://www.cyberciti.biz/faq/linux-remove-user-command/
30+
- https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/
31+
- https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
32+
- http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
33+
- http://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
5234
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a
35+
- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode
36+
- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
37+
- https://github.com/grayhatkiller/SharpExShell
38+
- https://petrusviet.medium.com/dancing-on-the-architecture-of-vmware-workspace-one-access-eng-ad592ae1b6dd
39+
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
40+
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
41+
- https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html
42+
- https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e
5343
- https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/yellow-liderc-ships-its-scripts-delivers-imaploader-malware.html
54-
- https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html
44+
- https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
45+
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization
46+
- https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1
5547
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
56-
- https://www.hexacorn.com/blog/2020/08/23/odbcconf-lolbin-trifecta/
48+
- https://learn.microsoft.com/en-us/windows/win32/wmisdk/connecting-to-wmi-remotely-starting-with-vista
49+
- http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
50+
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
51+
- https://www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747/
52+
- http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
53+
- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
54+
- https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/
55+
- https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/
56+
- https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2
5757
- https://github.com/fortra/impacket/blob/33058eb2fde6976ea62e04bc7d6b629d64d44712/examples/smbexec.py#L286-L296
58+
- https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd
5859
- https://community.f5.com/t5/technical-forum/icontrolrest-11-5-execute-bash-command/td-p/203029
59-
- https://www.sans.org/cyber-security-summit/archives
60-
- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
60+
- https://github.com/fortra/impacket/blob/edef71f17bc1240f9f8c957bbda98662951ac3ec/examples/smbexec.py#L60
61+
- https://linux.die.net/man/8/useradd
62+
- https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/
63+
- https://www.group-ib.com/resources/threat-research/silence_2.0.going_global.pdf
64+
- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/
65+
- https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b
66+
- https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195
67+
- https://github.com/ForceFledgling/CVE-2023-22518
68+
- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html
69+
- https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html
70+
- https://linux.die.net/man/1/arecord
6171
- https://www.hexacorn.com/blog/2017/01/14/beyond-good-ol-run-key-part-53/
62-
- https://www.virustotal.com/gui/file/d72af640b71b8e3eca3eba660dd7c7f029ff8852bcacaa379e7b6c57cf4d9b44
63-
- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
64-
- https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/
72+
- https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
6573
- https://www.cyberciti.biz/faq/how-force-kill-process-linux/
66-
- https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd
67-
- http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/
74+
- https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/
75+
- https://paper.seebug.org/1495/
76+
- https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/
77+
- https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf
6878
- https://f5-sdk.readthedocs.io/en/latest/apidoc/f5.bigip.tm.util.html#module-f5.bigip.tm.util.bash
69-
- https://doublepulsar.com/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b
70-
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
79+
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
80+
- https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/
81+
- https://www.group-ib.com/resources/threat-research/red-curl-2.html
82+
- https://www.hexacorn.com/blog/2018/08/31/beyond-good-ol-run-key-part-85/
83+
- https://us-cert.cisa.gov/ncas/alerts/aa21-008a
84+
- http://www.hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/
85+
- https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html
86+
- https://www.fireeye.com/blog/threat-research/2020/01/saigon-mysterious-ursnif-fork.html
87+
- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/
88+
- http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/
89+
- https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/
90+
- https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/
91+
- http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/
7192
- http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
72-
- https://www.group-ib.com/resources/threat-research/silence_2.0.going_global.pdf
73-
- https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2
74-
- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
75-
- https://github.com/grayhatkiller/SharpExShell
76-
- https://github.com/api0cradle/LOLBAS/blob/d148d278f5f205ce67cfaf49afdfb68071c7252a/OSScripts/pester.md
77-
- https://petrusviet.medium.com/dancing-on-the-architecture-of-vmware-workspace-one-access-eng-ad592ae1b6dd
93+
- https://www.hexacorn.com/blog/2018/09/02/beyond-good-ol-run-key-part-86/
94+
- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
95+
- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
7896
- https://www.hexacorn.com/blog/2023/06/07/this-lolbin-doesnt-exist/
79-
- https://linux.die.net/man/1/arecord
80-
- http://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
81-
- https://www.hexacorn.com/blog/2018/08/31/beyond-good-ol-run-key-part-85/
82-
- https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/
97+
- https://www.virustotal.com/gui/file/d72af640b71b8e3eca3eba660dd7c7f029ff8852bcacaa379e7b6c57cf4d9b44
98+
- https://github.com/api0cradle/LOLBAS/blob/d148d278f5f205ce67cfaf49afdfb68071c7252a/OSScripts/pester.md
8399
- https://mp.weixin.qq.com/s/wUoBy7ZiqJL2CUOMC-8Wdg
84-
- https://github.com/fortra/impacket/blob/edef71f17bc1240f9f8c957bbda98662951ac3ec/examples/smbexec.py#L60
85-
- https://www.hexacorn.com/blog/2019/02/15/beyond-good-ol-run-key-part-103/
86-
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
87-
- https://learn.microsoft.com/en-us/windows/win32/wmisdk/connecting-to-wmi-remotely-starting-with-vista
88-
- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html
89-
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Msxsl/
90-
- https://linux.die.net/man/8/useradd
91-
- https://peterjson.medium.com/reproducing-the-proxyshell-pwn2own-exploit-49743a4ea9a1
92-
- https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/
93-
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
94-
- https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf
95-
- https://www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747/
96-
- https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e
97-
- https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization
98-
- https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/
99-
- https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/
100-
- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode
101-
- https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/
100+
- https://us-cert.cisa.gov/ncas/alerts/aa21-259a
101+
- https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/
102102
- https://www.aon.com/cyber-solutions/aon_cyber_labs/yours-truly-signed-av-driver-weaponizing-an-antivirus-driver/
103-
- https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/
104-
- https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/
105-
- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/
106-
- https://www.group-ib.com/resources/threat-research/red-curl-2.html
107-
- https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662
108-
- https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/

tests/rule-references.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3462,3 +3462,6 @@ https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provid
34623462
https://community.f5.com/t5/technical-forum/running-bash-commands-via-rest-api/td-p/272516
34633463
https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification
34643464
https://github.com/AliBrTab/CVE-2023-46747-POC/tree/main
3465+
https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662
3466+
https://lolbas-project.github.io/lolbas/OtherMSBinaries/Msxsl/
3467+
https://www.huntress.com/blog/confluence-to-cerber-exploitation-of-cve-2023-22518-for-ransomware-deployment

0 commit comments

Comments
 (0)