Minimalistic Local Admin Bruteforcer (Windows Privilege Escalation) - InfosecMatter
https://www.infosecmatter.com/minimalistic-local-admin-bruteforcer-windows-privilege-escalation/
https://www.infosecmatter.com/minimalistic-local-admin-bruteforcer-windows-privilege-escalation/
InfosecMatter
Windows Local Admin Brute Force Attack Tool (LocalBrute.ps1) - InfosecMatter
LocalBrute.ps1 is a local admin password brute force tool written in PowerShell as a method of privilege escalation on Windows. It can brute force any local account.
800 GB Cources [hacking, pentest,ctf, RED team]
https://mega.nz/folder/ipkzVbxY#YmRFYvZeKEHl9SHz-eRQsQ
https://mega.nz/folder/ipkzVbxY#YmRFYvZeKEHl9SHz-eRQsQ
mega.nz
File folder on MEGA
GitHub - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
GitHub
GitHub - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods…
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
GitHub - blackarrowsec/mssqlproxy: mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
https://github.com/blackarrowsec/mssqlproxy
https://github.com/blackarrowsec/mssqlproxy
GitHub
GitHub - blackarrowsec/mssqlproxy: mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through…
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse - blackarrowsec/mssqlproxy
Air-Fi: Generating Covert Wi-Fi Signals from Air-Gapped Computers
https://youtu.be/vhNnc0ln63c
https://youtu.be/vhNnc0ln63c
YouTube
Air-Fi: Generating Covert Wi-Fi Signals from Air-Gapped Computers
By Mordechai Guri
paper: http://www.covertchannels.com
https://arxiv.org/abs/2012.06884
paper: http://www.covertchannels.com
https://arxiv.org/abs/2012.06884
df -BG # List the file systems so that their space used/available is shown in gigabytes. This is more consistent than using just -h to show human readable. Good for if you have several and want to compare.
[Reverse Engineering Tips] — IDA Python | by Thomas Roccia | BlackFr0g | Jan, 2021 | Medium
https://medium.com/malware-buddy/reverse-engineering-tips-ida-python-bd0ce64a48ed
https://medium.com/malware-buddy/reverse-engineering-tips-ida-python-bd0ce64a48ed
Medium
[Reverse Engineering Tips] — IDA Python
One of the greatest features of IDA is the ability to use Python directly in the interface to manipulate the disassembly code. IDAPython…