GitHub - snovvcrash/MirrorDump: Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory
https://github.com/snovvcrash/MirrorDump
https://github.com/snovvcrash/MirrorDump
GitHub
GitHub - snovvcrash/MirrorDump: Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle…
Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory - snovvcrash/MirrorDump
Managing Privileges using PoshPrivilege – Learn Powershell | Achieve More
https://learn-powershell.net/2015/06/03/managing-privileges-using-poshprivilege/amp/?__twitter_impression=true
https://learn-powershell.net/2015/06/03/managing-privileges-using-poshprivilege/amp/?__twitter_impression=true
Learn Powershell | Achieve More
Managing Privileges using PoshPrivilege
A recent project of mine has been to write a module to manage privileges on a local system. What I came up is a module called PoshPrivilege that allows you to not only look at what user rights are …
GitHub - dievus/msdorkdump: Google Dork File Finder
https://github.com/dievus/msdorkdump
https://github.com/dievus/msdorkdump
GitHub
GitHub - dievus/msdorkdump: Google Dork File Finder
Google Dork File Finder. Contribute to dievus/msdorkdump development by creating an account on GitHub.
eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html
GitHub - DarkCoderSc/PowerRemoteDesktop: Remote Desktop entirely coded in PowerShell.
https://github.com/DarkCoderSc/PowerRemoteDesktop
https://github.com/DarkCoderSc/PowerRemoteDesktop
GitHub
GitHub - PhrozenIO/PowerRemoteDesktop: Remote Desktop entirely coded in PowerShell.
Remote Desktop entirely coded in PowerShell. Contribute to PhrozenIO/PowerRemoteDesktop development by creating an account on GitHub.
GitHub - boku7/BokuLoader: Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities. By: @0xBoku & @s4ntiago_p
https://github.com/boku7/BokuLoader
https://github.com/boku7/BokuLoader
GitHub
GitHub - boku7/BokuLoader: A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt…
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features! - boku7/BokuLoader
Attacking Active Directory: 0 to 0.9 | zer1t0
https://zer1t0.gitlab.io/posts/attacking_ad/
https://zer1t0.gitlab.io/posts/attacking_ad/
Linux privilege escalation exploit:
$ alias whoami='echo root'
$ export PS1='# '
# whoami
root
😎
$ alias whoami='echo root'
$ export PS1='# '
# whoami
root
😎
Playing With Cobalt Strike | Sid's Blog
https://swlacy.com/posts/playing-with-cobalt-strike
https://swlacy.com/posts/playing-with-cobalt-strike
Sid's Blog
Playing With Cobalt Strike
Fun with Cobalt Strike v4.5
GitHub - mkellerman/Invoke-CommandAs: Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects.
https://github.com/mkellerman/Invoke-CommandAs
https://github.com/mkellerman/Invoke-CommandAs
GitHub
GitHub - mkellerman/Invoke-CommandAs: Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects.
Invoke Command As System/Interactive/GMSA/User on Local/Remote machine & returns PSObjects. - mkellerman/Invoke-CommandAs