Rezultati pretraživanja
  1. 1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

  2. 4. velj

    Beacon found at SHA256: 5884a9cefa3fa1f841923eefcf4201c0ffacabc275687fa1d2a7786f5cdaf281 C2: http://iexploreservice[.]com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,

  3. 4. velj

    Beacon found at SHA256: 629a030baf77efbc5946965ccec68b06428e9b721102f4dbd4fa40233c27abf4 C2: http://40[.]114[.]116[.]10/w/index[.]php,

  4. 3. velj

    Beacon found at SHA256: 2cc90d4ca4c8787527a33e6a14eae90670773f2278a9e3bb79d2c1c9d51631f0 C2: http://46[.]28[.]205[.]87/ca,

  5. 3. velj

    New versions of Beacon have moved away from the hardcoded default config XOR key. Since a couple examples hit Pastebin last week, I upgraded config parser to handle other key values.

  6. 3. velj
    Odgovor korisniku/ci

    I just added some of the scripts I use to a new repository. The script you need is the logging.cna script created by .

  7. 2. velj

    is an extension built into for lateral movement by leveraging the execute_assembly function with the SharpMove and SharpRDP .NET assemblies. Users can execute a command on a remote system through WMI, DCOM, RDP, etc.

  8. 1. velj

    Beacon found at SHA256: 2ae3ad81274c717f56cf9db2bd7ac9f52c3b583f2ffedb132dfde0c7109dc560 C2:

  9. 1. velj
  10. 29. sij

    Adversary simulation toolkits ? The joke's on us.

  11. 28. sij

    Move faster, Stay longer with MoveKit and StayKit

  12. What's more exciting than the beginning of 2020? 4.0 variants! Here's a walkthrough of some of the useful changes that come with the 4.0 release.⬇️

  13. 27. pro 2019.

    Finally got around to migrating my AES Powershell payload created for to a standalone script. Just needs position independent shellcode (Windows). Should probably also obfuscate your shellcode prior.

  14. 16. pro 2019.

    2019-12-16:🐚 Loader -> 🛸 XOR Blob 0xAA| 🔦Dbg vcruntime140d & ucrtbased -> FUD ⏬ 😉C:\Users\ahrmo\Desktop\cobaltstrike 3.14\payload\AvByPass\x64\Debug\AvByPass.pdb 🛡️C2:47.107.136. 247 MD5: 42bd9b67a5576b5332f97a3c2bd48399 h/t

  15. 5. stu 2019.
  16. 9. lis 2019.

    2019-10-09 - More Docusign-themed pushing again today (I missed yesterday's wave) - Took me a while to get the zip archive from links in the emails, but I eventually got it. Infection traffic contains indicators for , , , and

  17. 28. kol 2019.

    Here's a Cobaltstrike beacon being popped on a VPN client that connected to pulse secure. Will share more information later on in the week or next week with Is that scary or what?

    Prikaži ovu nit
  18. Learn about our Aggressor MSBuild scripts for CobaltStrike, how to use them, and direct links to all resources. Just a small taste of what will be covered in our free webinar and BHUSA training 👇🏻

  19. 21. lip 2019.

    Redteam folks: looking for any resources on cobalt strike scripting, beyond the basics Mudge has on the website. Talks, tutorials, whitepapers, examples all welcome.

  20. 15. lip 2019.

    Happy to share that the Sliver framework is live at our right now - if you were intrigued by this alternative, check it out:

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.