A Tale of Escaping a Hardened Docker container - Red Timmy Security
https://www.redtimmy.com/docker/a-tale-of-escaping-a-hardened-docker-container/
https://www.redtimmy.com/docker/a-tale-of-escaping-a-hardened-docker-container/
Red Timmy Security
A Tale of Escaping a Hardened Docker container - Red Timmy Security
How to escape out of a docker container by circumventing an ad-hoc reverse proxy that was supposed to prevent abuse of "docker.sock" file exposure
GitHub - jafarlihi/serpentine: Windows RAT (Remote Administration Tool) with a multiplatform RESTful C2 server
https://github.com/jafarlihi/serpentine
https://github.com/jafarlihi/serpentine
GitHub - tokyoneon/Chimera: Chimera is a (shiny and very hack-ish) PowerShell obfuscation noscript designed to bypass AMSI and commercial antivirus solutions.
https://github.com/tokyoneon/Chimera
https://github.com/tokyoneon/Chimera
GitHub
GitHub - tokyoneon/Chimera: Chimera is a PowerShell obfuscation noscript designed to bypass AMSI and commercial antivirus solutions.
Chimera is a PowerShell obfuscation noscript designed to bypass AMSI and commercial antivirus solutions. - tokyoneon/Chimera
GitHub - G0ldenGunSec/SharpSecDump: .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
https://github.com/G0ldenGunSec/SharpSecDump
https://github.com/G0ldenGunSec/SharpSecDump
GitHub
GitHub - G0ldenGunSec/SharpSecDump: .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py - G0ldenGunSec/SharpSecDump
Bypass AMSI by manual modification | S3cur3Th1sSh1t
https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/
https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/
s3cur3th1ssh1t.github.io
Bypass AMSI by manual modification | S3cur3Th1sSh1t
This is my very first blog post. Its about how to manually change AMSI signatures/triggers to bypass it.
#!/bin/bash
scan (){
timeout 1 bash -c "echo >/dev/tcp/192.168.8.109/$1 2>/dev/null " && echo "port $1 is open"
}
for port in {1..100}; do
scan $port &
done
scan (){
timeout 1 bash -c "echo >/dev/tcp/192.168.8.109/$1 2>/dev/null " && echo "port $1 is open"
}
for port in {1..100}; do
scan $port &
done