-
Compromising Domain Admin in Internal Pentest https://goo.gl/7NnxBX
#Bloodhound#Powersploit#Pentest#LazyKatz#Powershell -
My write-up on logging keys with PowerShell. http://www.patch-tuesday.net/2016/01/scripting-windows-key-logger.html …
#PowerSploit -
We analyzed a new cluster of PowerShell loaders used by
#Turla to execute various custom malware into-memory only. The loader is based on the Penetration testing framework#PowerSploit. Payloads include a RPC backdoor and a PowerShell backdoor abusing OneDrive as C&C server. https://twitter.com/welivesecurity/status/1133671400835899393 …pic.twitter.com/m0Sq31J0qJ
-
How to Control Nearly any Windows Computer with Powersploit
#powersploit#windows#cybersecurity#infosec http://bit.ly/2oJP9xC pic.twitter.com/AAWJa8owJX
-
It sure feels good to have contributed a little, to such a kick ass project! https://github.com/PowerShellMafia/PowerSploit/blob/0939af5bb2ee556ea998c3f0fd1e21ef72c41719/Exfiltration/Get-GPPAutologon.ps1 …
#PowerSploit -
Created a very simple yet efficient
@yararules to detect#PowerSploit's@stephenfewer Reflective DLL Injection module. You can try it out here:https://github.com/proferosec/Threat-Intelligence/blob/master/YaraRules/powershell.yar … -
2/ On Anniversary update, it's disabled by default for non-privileged users. implications:
#PowerSploit's Get-NetLocalGroup no longer works -
Where My Admins At? (GPO Edition)
#PowerSploit by@harmj0yhttp://www.harmj0y.net/blog/redteaming/where-my-admins-at-gpo-edition/ … -
If you were having problems with Invoke-Mimikatz post-patch,
@JosephBialek updated it!#PowerSploit https://github.com/mattifestation/PowerSploit/blob/master/Exfiltration/Invoke-Mimikatz.ps1 … Please Update. -
Using PowerShell to find AV signatures $BlogPost = http://www.obscuresecurity.blogspot.com/2012/12/finding-simple-av-signatures-with.html …
#PowerSploit -
Using
#metasploit and#powersploit in a step by step hacking tutorial on the Metasploitable 3 virtual machine. https://www.zero-day.io/metasploitwalkthrough/ … pic.twitter.com/WWoswjS6hp
-
Is anyone else amazed and terrified when Get-GPPPassword still works?
#infosec#powersploit pic.twitter.com/lMHtAbNlw2 -
Announcing "Post Exploitation with PowerSploit (Getting started)" by
@riyazwalikar Reg open: 1st June 2018 10:00 PM Reg close: 4th June 2018 7:00 PM https://null.co.in/events/455-bangalore-null-bangalore-humla-09-june-2018-post-exploitation-with-powersploit-getting-started …#nullBlr#nullhumla#powersploit -
A Powershell command resulting in Rickroll via ASCII, possibly the best thing I've ever seen LOL.
#Powersploit@mattifestation -
For Invoke-Mimikatz in "recent" version use /dev of
#powersploit You only need to past#mimikatz compiled DLL into! https://github.com/PowerShellMafia/PowerSploit/blob/dev/Exfiltration/Invoke-Mimikatz.ps1 …pic.twitter.com/KXrIvb5kmU
-
Taking Control of Anyone's Windows System with Powersploit
#powersploit#cybersecurity#powershell http://bit.ly/2oJP9xC pic.twitter.com/Dz3dRyz07L
-
Invoke-Shellcode is fixed with a couple other updates. Thank you
@enigma0x3 and@harmj0y#PowerSploit https://github.com/mattifestation/PowerSploit/blob/master/CodeExecution/Invoke--Shellcode.ps1 … -
Gotta dive into
#PowerSploit. Never played with it much, but I hear its "powerful" (no pun intended
). I'm especially interested in the DLL injection module. #PowerShell#DFIR#CyberSecurity#Malwarehttps://twitter.com/three_cube/status/1073658732758806528 …
Prikaži ovu nit -
Top 8 Penetration Testing Tools to Use. [Infographic]
#penetrationtesting#pen#testing#RPA#Nmap#BurbSuite#PowerSploit pic.twitter.com/OdqBr3IGgR
-
#PowerSploit: The Easiest Shell You’ll Ever Get http://www.pentestgeek.com/2013/09/18/invoke-shellcode/ …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.