AMSI Bypass - Memory Patching - aidenpearce369
https://aidenpearce369.github.io/offsec/AMSI-Memory-Bypass/
https://aidenpearce369.github.io/offsec/AMSI-Memory-Bypass/
GitHub - edoardottt/awesome-hacker-search-engines: A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
https://github.com/edoardottt/awesome-hacker-search-engines
https://github.com/edoardottt/awesome-hacker-search-engines
GitHub
GitHub - edoardottt/awesome-hacker-search-engines: A curated list of awesome search engines useful during Penetration testing,…
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more - edoardottt/awesome-hacker-search-engines
Found an interesting API endpoint ? Here's how to fuzz it 🔥🔥🔥
ffuf -u target. com/api/v2/FUZZ -w api_seen_in_wild.txt -c -ac -t 250 -fc 400,404,412
Here are some sick wordlists 🔥🔥🔥
https://github.com/Net-hunter121/API-Wordlist
ffuf -u target. com/api/v2/FUZZ -w api_seen_in_wild.txt -c -ac -t 250 -fc 400,404,412
Here are some sick wordlists 🔥🔥🔥
https://github.com/Net-hunter121/API-Wordlist
GitHub
GitHub - Net-hunter121/API-Wordlist
Contribute to Net-hunter121/API-Wordlist development by creating an account on GitHub.
Detectree: Detection Visualisation for Blue Teams
https://labs.withsecure.com/tools/detectree
https://labs.withsecure.com/tools/detectree
Release AD-denoscription-password-finder v2.0.0 · AssuranceMaladieSec/AD-denoscription-password-finder · GitHub
https://github.com/AssuranceMaladieSec/AD-denoscription-password-finder/releases/tag/v2.0.0
https://github.com/AssuranceMaladieSec/AD-denoscription-password-finder/releases/tag/v2.0.0
GitHub
Release AD-denoscription-password-finder v2.0.0 · AssuranceMaladieSec/AD-denoscription-password-finder
Better regex
Push in the results denoscriptions suspected of containing passwords but didn't match the one in the ntds
Push in the results denoscriptions suspected of containing passwords but didn't match the one in the ntds
GitHub - enkomio/AlanFramework: A C2 post-exploitation framework
https://github.com/enkomio/AlanFramework
https://github.com/enkomio/AlanFramework
GitHub
GitHub - enkomio/AlanFramework: A C2 post-exploitation framework
A C2 post-exploitation framework. Contribute to enkomio/AlanFramework development by creating an account on GitHub.
x86matthew - EmbedExeReg - Embedding an EXE inside a .REG file with automatic execution
https://www.x86matthew.com/view_post?id=embed_exe_reg
https://www.x86matthew.com/view_post?id=embed_exe_reg
Are you looking for a Remote job? Here you go 🚀👇🏻
→ remoteok .io
→showwcase .com
→ freelancer .com
→ remotive .io
→ remoteglobal .com
→ devsnap .io
→working nomads .co
→ nodes .co
→epic jobs .co
→ remotehunt .com
→ weworkremotely .com
→flexjobs .com
→ remoteok .io
→showwcase .com
→ freelancer .com
→ remotive .io
→ remoteglobal .com
→ devsnap .io
→working nomads .co
→ nodes .co
→epic jobs .co
→ remotehunt .com
→ weworkremotely .com
→flexjobs .com
GitHub - Hackndo/lsassy: Extract credentials from lsass remotely
https://github.com/Hackndo/lsassy
https://github.com/Hackndo/lsassy
GitHub
GitHub - login-securite/lsassy: Extract credentials from lsass remotely
Extract credentials from lsass remotely. Contribute to login-securite/lsassy development by creating an account on GitHub.
LNK forensic and config extraction of a cobalt strike beacon
https://malcat.fr/blog/lnk-forensic-and-config-extraction-of-a-cobalt-strike-beacon/
https://malcat.fr/blog/lnk-forensic-and-config-extraction-of-a-cobalt-strike-beacon/
MALCAT
LNK forensic and config extraction of a cobalt strike beacon
Windows shortcut files can contain valuable data. We will see how to extract the most information out of a .lnk downloader and will manually extract the configuration file of the final cobalt strike beacon using malcat