776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 3 / 5
Newer►
88 results tagged windows x
  • thumbnail
    NTAPI Undocumented Functions
    March 19, 2021 at 9:48:32 AM UTC - permalink -
    QRCode
    - http://undocumented.ntinternals.net/index.html?page=UserMode%2FUndocumented%20Functions%2FNT%20Objects%2FSection%2FNtMapViewOfSection.html
    ntapi undocumented functions windows
  • thumbnail
    Process Herpaderping | herpaderping
    October 28, 2020 at 4:10:40 PM UTC - permalink -
    QRCode
    - https://jxy-s.github.io/herpaderping/
    bypass signature kernel process herpaderping windows evasion edr av
  • thumbnail
    nccgroup/keimpx: Check for valid credentials across a network over SMB
    October 26, 2020 at 2:06:37 PM UTC - permalink -
    QRCode
    - https://github.com/nccgroup/keimpx
    tool spray ntlm windows
  • thumbnail
    PowerPoint Presentation - eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf
    October 20, 2020 at 9:31:03 AM UTC - permalink -
    QRCode
    - https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf
    av bypass doppelganging process hollowing windows edr
  • thumbnail
    Abusing SeLoadDriverPrivilege for privilege escalation - Tarlogic Security - Cyber Security and Ethical hacking
    September 2, 2020 at 5:25:50 PM UTC * - permalink -
    QRCode
    - https://www.tarlogic.com/en/blog/abusing-seloaddriverprivilege-for-privilege-escalation/
    seloaddriverprivilege driver privesc windows load kernel process token
  • thumbnail
    File transfers windows/linux
    August 26, 2020 at 3:07:53 PM UTC - permalink -
    QRCode
    - https://mp.weixin.qq.com/s/pz6y8299gMUOgtZjZv5puw
    windows file transfer upload download
  • thumbnail
    matterpreter/DefenderCheck: Identifies the bytes that Microsoft Defender flags on.
    July 24, 2020 at 8:11:18 AM UTC - permalink -
    QRCode
    - https://github.com/matterpreter/DefenderCheck
    windows defender evasion flag signature payload
  • thumbnail
    S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
    July 14, 2020 at 9:24:05 PM UTC - permalink -
    QRCode
    - https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet#sid-history-abuse
    windows ad cheatsheet offshore rastalabs cybernetics hackthebox prolabs
  • thumbnail
    Create A Windows Service In C#
    June 20, 2020 at 2:20:51 PM UTC - permalink -
    QRCode
    - https://www.c-sharpcorner.com/article/create-windows-services-in-c-sharp/
    windows service c# 
  • thumbnail
    Going Deep | Channel 9
    June 17, 2020 at 9:09:37 AM UTC - permalink -
    QRCode
    - https://channel9.msdn.com/Shows/Going+Deep
    windows internals videos internal
  • thumbnail
    Windows Notes / Cheatsheet
    June 10, 2020 at 2:53:09 PM UTC - permalink -
    QRCode
    - https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html#-bloodhound-python
    windows cheatsheet
  • thumbnail
    Adam Chester on Twitter: "Want to stop ETW from giving up your loaded .NET assemblies to that pesky EDR, but can't be bothered patching memory? Just pass COMPlus_ETWEnabled=0 as an environment variable during your CreateProcess call 😂 https://t.co/wXWeSdt0li" / Twitter

    bypassing edr

    June 5, 2020 at 10:50:03 AM UTC - permalink -
    QRCode
    - https://twitter.com/_xpn_/status/1268712093928378368/photo/1
    bypass edr windows
  • thumbnail
    antonioCoco/RunasCs: RunasCs - Csharp and open version of windows builtin runas.exe
    June 5, 2020 at 8:33:55 AM UTC - permalink -
    QRCode
    - https://github.com/antonioCoco/RunasCs
    runas windows interactive
  • thumbnail
    itm4n/PrivescCheck: Privilege Escalation Enumeration Script for Windows
    June 4, 2020 at 10:47:19 PM UTC * - permalink -
    QRCode
    - https://github.com/itm4n/PrivescCheck
    windows privesc script itm4n
  • itm4n/SysTracingPoc: CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability
    May 25, 2020 at 8:01:33 PM UTC * - permalink -
    QRCode
    - https://github.com/itm4n/SysTracingPoc
    windows lpe privilege escalation privesc tracing
  • CVE-2020-0668 - A Trivial Privilege Escalation Bug in Windows Service Tracing | PS C:\Users\itm4n> _
    May 25, 2020 at 8:01:21 PM UTC * - permalink -
    QRCode
    - https://itm4n.github.io/cve-2020-0668-windows-service-tracing-eop/
    windows lpe privilege escalation
  • thumbnail
    Windows exploitation - FullPwn Security Operations
    May 6, 2020 at 5:03:52 PM UTC - permalink -
    QRCode
    - https://fullpwnops.com/windows-exploitation-pathway.html
    windows exploitation pwn exploit
  • thumbnail
    windowsblindread/windows-files.txt at master · soffensive/windowsblindread · GitHub
    April 15, 2020 at 2:40:44 PM UTC - permalink -
    QRCode
    - https://github.com/soffensive/windowsblindread/blob/master/windows-files.txt
    lfi file read path traversal windows
  • thumbnail
    MiniDumpWriteDump via COM+ Services DLL | modexp
    December 3, 2019 at 4:50:29 PM UTC - permalink -
    QRCode
    - https://modexp.wordpress.com/2019/08/30/minidumpwritedump-via-com-services-dll/
    dump mini dll windows mimikatz katz spraykatz procdump
  • GitHub - S3cur3Th1sSh1t/WinPwn: Automation for internal Windows Penetrationtest / AD-Security
    November 20, 2019 at 11:02:50 AM UTC * - permalink -
    QRCode
    - https://github.com/S3cur3Th1sSh1t/WinPwn
    windows privesc privilege escalation hacking pentest
Links per page: 20 50 100
◄Older
page 3 / 5
Newer►
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation