GitHub - tokyoneon/Chimera: Chimera is a (shiny and very hack-ish) PowerShell obfuscation noscript designed to bypass AMSI and commercial antivirus solutions.
https://github.com/tokyoneon/Chimera
https://github.com/tokyoneon/Chimera
GitHub
GitHub - tokyoneon/Chimera: Chimera is a PowerShell obfuscation noscript designed to bypass AMSI and commercial antivirus solutions.
Chimera is a PowerShell obfuscation noscript designed to bypass AMSI and commercial antivirus solutions. - tokyoneon/Chimera
GitHub - G0ldenGunSec/SharpSecDump: .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
https://github.com/G0ldenGunSec/SharpSecDump
https://github.com/G0ldenGunSec/SharpSecDump
GitHub
GitHub - G0ldenGunSec/SharpSecDump: .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py
.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py - G0ldenGunSec/SharpSecDump
Bypass AMSI by manual modification | S3cur3Th1sSh1t
https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/
https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/
s3cur3th1ssh1t.github.io
Bypass AMSI by manual modification | S3cur3Th1sSh1t
This is my very first blog post. Its about how to manually change AMSI signatures/triggers to bypass it.
#!/bin/bash
scan (){
timeout 1 bash -c "echo >/dev/tcp/192.168.8.109/$1 2>/dev/null " && echo "port $1 is open"
}
for port in {1..100}; do
scan $port &
done
scan (){
timeout 1 bash -c "echo >/dev/tcp/192.168.8.109/$1 2>/dev/null " && echo "port $1 is open"
}
for port in {1..100}; do
scan $port &
done
WinXP source code leaked cough cough https://mega.nz/file/PdhxBSZD#w-O3C-BAMwE4E02qPn_fSdTivILcE8hzk9PeyoXg7wU
mega.nz
File on MEGA
A different way of abusing Zerologon (CVE-2020-1472) - dirkjanm.io
https://dirkjanm.io/a-different-way-of-abusing-zerologon/
https://dirkjanm.io/a-different-way-of-abusing-zerologon/
dirkjanm.io
A different way of abusing Zerologon (CVE-2020-1472)
In August 2020, Microsoft patched CVE-2020-1472 aka Zerologon. This is in my opinion one of the most critical Active Directory vulnerabilities of the past few years, since it allows for instant escalation to Domain Admin without credentials. The most straightforward…