Weaponize PDF with embedding SettingContent-ms inside PDF.
https://github.com/DidierStevens/DidierStevensSuite/blob/master/make-pdf-embedded.py
@WindowsHackingLibrary
Via: @InfosecN1nja
https://github.com/DidierStevens/DidierStevensSuite/blob/master/make-pdf-embedded.py
@WindowsHackingLibrary
Via: @InfosecN1nja
GitHub
DidierStevensSuite/make-pdf-embedded.py at master · DidierStevens/DidierStevensSuite
Please no pull requests for this repository. Thanks! - DidierStevens/DidierStevensSuite
Persistence using GlobalFlags in Image File Execution Options – Hidden from Autoruns.exe
https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe
@WindowsHackingLibrary
https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe
@WindowsHackingLibrary
Oddvar Moe's Blog
Persistence using GlobalFlags in Image File Execution Options – Hidden from Autoruns.exe
TL;DR – Found a technique to execute any binary file after another application is closed without being detected by Autoruns.exe. – Requires administrator rights and does not belong in userland. – C…
Compromising a Azure Windows 2008 R2 SP1 VM
https://guptaashish.com/2018/07/04/compromising-a-azure-windows-2008-r2-sp1-vm
@WindowsHackingLibrary
https://guptaashish.com/2018/07/04/compromising-a-azure-windows-2008-r2-sp1-vm
@WindowsHackingLibrary
Ashish Gupta
Compromising an Azure Windows 2008 R2 SP1 VM
TL;DR (Too long Didn’t Read)If you stand up a windows 2008 R2 VM in Azure with a random user name and password, Its very easy to know that user name and depending on the complexity of the chosen pa…
Microsoft LAPS Security & Active Directory LAPS Configuration Recon
https://adsecurity.org/?p=3164
@WindowsHackingLibrary
https://adsecurity.org/?p=3164
@WindowsHackingLibrary
PowerShell is definitely a "gateway drug" to C# - GhostPack is a collection of new security tools (currently C#), getting rid of the attention that powershell monitoring is getting
https://github.com/GhostPack
@WindowsHackingLibrary
https://github.com/GhostPack
@WindowsHackingLibrary
GitHub
GhostPack
A collection of security related toolsets. GhostPack has 18 repositories available. Follow their code on GitHub.
Pass the Hash with Kerberos
https://malicious.link/post/2018/pass-the-hash-with-kerberos/
@WindowsHackingLibrary
https://malicious.link/post/2018/pass-the-hash-with-kerberos/
@WindowsHackingLibrary
w0rk3r's Windows Hacking Library
PowerShell is definitely a "gateway drug" to C# - GhostPack is a collection of new security tools (currently C#), getting rid of the attention that powershell monitoring is getting https://github.com/GhostPack @WindowsHackingLibrary
Medium
GhostPack
Anyone who has followed myself or my teammates at SpecterOps for a while knows that we’re fairly big fans of PowerShell. I’ve been involved in offensive PowerShell for about 4 years, @mattifestation…
Domain Goodness – How I Learned to LOVE AD Explorer
https://www.blackhillsinfosec.com/domain-goodness-learned-love-ad-explorer/
@WindowsHackingLibrary
https://www.blackhillsinfosec.com/domain-goodness-learned-love-ad-explorer/
@WindowsHackingLibrary
Black Hills Information Security, Inc.
Domain Goodness - How I Learned to LOVE AD Explorer - Black Hills Information Security, Inc.
Sally Vandeven // OR How to Pentest with AD Explorer! Mark Russinovich’s Sysinternals tools (Microsoft) are nothing new. They have been a favorite among system administrators for many, many years. […]
Another way to get to a system shell – Assistive Technology
https://oddvar.moe/2018/07/23/another-way-to-get-to-a-system-shell
@WindowsHackingLibrary
https://oddvar.moe/2018/07/23/another-way-to-get-to-a-system-shell
@WindowsHackingLibrary
Oddvar Moe's Blog
Another way to get to a system shell – Assistive Technology
TL;DR Manipulate HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\ATs\magnifier – StartExe to run other binary when pressing WinKey and plus to zoom. Can load bin…
Robber : An open source tool for finding executables prone to DLL hijacking
https://github.com/MojtabaTajik/Robber
@WindowsHackingLibrary
https://github.com/MojtabaTajik/Robber
@WindowsHackingLibrary
GitHub
GitHub - MojtabaTajik/Robber: Robber is open source tool for finding executables prone to DLL hijacking
Robber is open source tool for finding executables prone to DLL hijacking - MojtabaTajik/Robber
SafetyKatz: a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader.
https://github.com/GhostPack/SafetyKatz
@WindowsHackingLibrary
https://github.com/GhostPack/SafetyKatz
@WindowsHackingLibrary
GitHub
GitHub - GhostPack/SafetyKatz: SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's…
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader - GhostPack/SafetyKatz
Stored passwords found all over the place after installing Windows in company networks
http://blog.win-fu.com/2017/08/stored-passwords-found-all-over-place.html
@WindowsHackingLibrary
http://blog.win-fu.com/2017/08/stored-passwords-found-all-over-place.html
@WindowsHackingLibrary
Win-Fu
Stored passwords found all over the place after installing Windows in company networks :(
Hi everyone! It's been a while as I had a nice summer and a busy Techmentor conference after my holiday, and hence I haven't really had th...
Security Fun: Bloodhound, MS16-072 and GPO Discoverability
https://sdmsoftware.com/group-policy-blog/security-related/security-fun-bloodhound-ms16-072-gpo-discoverability
@FromZer0toHero
https://sdmsoftware.com/group-policy-blog/security-related/security-fun-bloodhound-ms16-072-gpo-discoverability
@FromZer0toHero
SDM Software
Security Fun: Bloodhound, MS16-072 and GPO Discoverability - SDM Software
I had a chance to attend my first BlackHat/Defcon conference last week in Las Vegas. I also attended the very excellent BSides conference, happening concurrently. Besides being shaken to my core from the skills demonstrated during the week :-), I got a chance…
Post Exploitation Using WMIC (System Command)
http://www.hackingarticles.in/post-exploitation-using-wmic-system-command/
@WindowsHackingLibrary
http://www.hackingarticles.in/post-exploitation-using-wmic-system-command/
@WindowsHackingLibrary
Hacking Articles
Post Exploitation Using WMIC (System Command)
This article is about Post Exploitation using the WMIC (Windows Management Instrumentation Command Line). When an Attacker gains a meterpreter session on a Remote PC,
Updated PoC Mimikatz Loader for 2018
PoC: https://gist.github.com/caseysmithrc/87f6572547f633f13a8482a0c91fb7b7
One-Liner: https://gist.github.com/xillwillx/96e2c5011577d8583635ad7bf6d4fb58
@WindowsHackingLibrary
Via: @SubTee
PoC: https://gist.github.com/caseysmithrc/87f6572547f633f13a8482a0c91fb7b7
One-Liner: https://gist.github.com/xillwillx/96e2c5011577d8583635ad7bf6d4fb58
@WindowsHackingLibrary
Via: @SubTee
Gist
Updated Katz.cs - Latest Mimikatz, I mean honestly it is 2018...
Updated Katz.cs - Latest Mimikatz, I mean honestly it is 2018... - katz.cs
Domain Penetration Testing: Using BloodHound, Crackmapexec, & Mimikatz to get Domain Admin
https://hausec.com/2017/10/21/domain-penetration-testing-using-bloodhound-crackmapexec-mimikatz-to-get-domain-admin
@WindowsHackingLibrary
https://hausec.com/2017/10/21/domain-penetration-testing-using-bloodhound-crackmapexec-mimikatz-to-get-domain-admin
@WindowsHackingLibrary
hausec
Domain Penetration Testing: Using BloodHound, Crackmapexec, & Mimikatz to get Domain Admin
In the previous two articles, I gathered local user credentials and escalated to local administrator, with my next step is getting to domain admin. Since I have local admin, I’ll be using a t…
Ultimate AppLocker ByPass List: The goal of this repository is to document the most common techniques to bypass AppLocker.
https://github.com/api0cradle/UltimateAppLockerByPassList/tree/Dev
@WindowsHackingLibrary
https://github.com/api0cradle/UltimateAppLockerByPassList/tree/Dev
@WindowsHackingLibrary
GitHub
GitHub - api0cradle/UltimateAppLockerByPassList at Dev
The goal of this repository is to document the most common techniques to bypass AppLocker. - GitHub - api0cradle/UltimateAppLockerByPassList at Dev
LDAP Injection Cheat Sheet, Attack Examples & Protection
https://www.checkmarx.com/knowledge/knowledgebase/LDAP
@WindowsHackingLibrary
https://www.checkmarx.com/knowledge/knowledgebase/LDAP
@WindowsHackingLibrary
PowerShell noscript which allows pausing\unpausing Win32/64 exes
https://github.com/besimorhino/Pause-Process
@WindowsHackingLibrary
https://github.com/besimorhino/Pause-Process
@WindowsHackingLibrary
GitHub
GitHub - besimorhino/Pause-Process: PowerShell noscript which allows pausing\unpausing Win32/64 exes
PowerShell noscript which allows pausing\unpausing Win32/64 exes - besimorhino/Pause-Process