Check here if you have any Question:
https://news.1rj.ru/str/ida_pro_chat
👍1
there is red-team workshop on 14 pm ( tehran time ) ( language -> persian )
mr.hashemi is going to talk about APT-38
it's going to be fun and a long workshop as he talking about all TTPs
so
فلاسک چای و خوراکی فراموش نشه :)
access work shop here ( no registration needed ) :
https://www.skyroom.online/ch/huntlearn/redteam
ended , will update the link with recorded version
.
mr.hashemi is going to talk about APT-38
it's going to be fun and a long workshop as he talking about all TTPs
so
فلاسک چای و خوراکی فراموش نشه :)
ended , will update the link with recorded version
.
👾9🔥6👍3❤🔥1
Forwarded from Infosec Fortress
This media is not supported in your browser
VIEW IN TELEGRAM
Hello again! I’m excited to announce a new feature in the plugin: it now supports regex-based searches. This means you can find instructions not just by their mnemonics, but also by using powerful regular expressions for more precise and flexible matching.
The Repository link
#projects
———
🆔 @Infosec_Fortress
The Repository link
#projects
———
🆔 @Infosec_Fortress
❤4👾2👍1
Kernel mode WinDbg extension and PoCs for testing how token privileges work.
https://github.com/daem0nc0re/PrivFu/tree/main
https://github.com/daem0nc0re/PrivFu/tree/main
GitHub
GitHub - daem0nc0re/PrivFu: Kernel mode WinDbg extension and PoCs for token privilege investigation.
Kernel mode WinDbg extension and PoCs for token privilege investigation. - daem0nc0re/PrivFu
👍5👎2🥱1😐1
A collection of tools which integrate with Cobalt Strike
(and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
https://github.com/outflanknl/C2-Tool-Collection
(and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.
https://github.com/outflanknl/C2-Tool-Collection
👍2❤1
Directory Services Internals (DSInternals)
Ad toolkit ,PowerShell Module and Framework
https://github.com/MichaelGrafnetter/DSInternals/tree/master
#ad
Ad toolkit ,PowerShell Module and Framework
https://github.com/MichaelGrafnetter/DSInternals/tree/master
#ad
👍3
Credential_Dumping_NTDS_dit_1628039354.pdf
1.2 MB
Credential Dumping: NTDS.dit
In this article, you will learn how passwords are stored in NTDS.dit file on Windows Server and then we will learn how to dump these credentials hashes from NTDS.dit file.
Table of Content
▪ Introduction to NTDS ▪ NTDSPartitions
▪ DatabaseStorageTable
▪ ExtractingCredentialbyExploitNTDS.ditinMultipleMethods
▪ FGDump
▪ NTDSUtil
▪ DSInternals
▪ NTDSDumpEx ▪ Metasploit
▪ NTDS_location ▪ NTDS_grabber ▪ secretsdump
▪ CrackMapExec
▪ CrackingHashes
#ad #active_directory
👍8