-
Use Web Query (.iqy) files for easy phishing. Blog post and
#Nishang commit soon. Thanks to@subTeepic.twitter.com/izZH4cCoRy
-
Out-Excel can now use the well known DDE technique.
#Nishang#PowerShell https://github.com/samratashok/nishang/blob/master/Client/Out-Excel.ps1 … pic.twitter.com/bKnEMjNQDu
-
Since Sticky keys & Utilman are in news, here is Add-RegBackdoor frm
#Nishang which disables NLA and sets payloads. https://github.com/samratashok/nishang/blob/master/Backdoors/Add-RegBackdoor.ps1 … -
#nishang has couple of very useful scripts for modifying Host Security Descriptors for persistence - Set-RemoteWMI and Set-RemotePSRemoting. A blog post is pending for six months on the scripts :/#PowerShell https://github.com/samratashok/nishang/tree/master/Backdoors … -
Nothing more satisfying then making tools which help fellow professionals.
#nishang#PowerShell -
#Nishang. framework and collection of scripts and payloads which enables usage of#PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing. by@nikhil_mitt https://github.com/samratashok/nishang … -
#HackTheBox Optimum video up. Another Windows Box without Metasploit or even MSFHandler.#Nishang rev shell FTW https://goo.gl/opN89M -
Nice work! I was just reading about
#nishang on a linkedin article -
@nikhil_mitt I'm investigating some, hidden folder titled#Nishang that i found; stashed in my root dir. Looks good bro -
#Nishang v0.3.0 The PowerShell for Penetration Testing released (introducing Powerpreter) http://www.toolswatch.org/2013/08/nishang-v0-3-0-the-powershell-for-penetration-testing-released-introducing-powerpreter/ … -
Introducing Antak: A webshell which utilizes
#powershell. Please RT.#nishang#antak http://www.labofapenetrationtester.com/2014/06/introducing-antak.html … … -
Thanks to
@gentilkiwi, the lsass crash when using AES keys for OverPTH, is fixed in the latest build of#mimikatz. Updated it in#Nishang as well. https://twitter.com/nikhil_mitt/status/983942353730789377 … https://twitter.com/gentilkiwi/status/988566699057217537 … https://github.com/gentilkiwi/mimikatz/releases/tag/2.1.1-20180424 … https://github.com/samratashok/nishang/blob/master/Gather/Invoke-Mimikatz.ps1 …
-
AND NOW: pt3 on the
#BHISblog bypassing Cylance by@6fletch9 this time w/#netcat &#nishang http://www.blackhillsinfosec.com/?p=5804 -
#Nishang v0.7.0 – PowerShell for penetration testing and offensive security. – Security List Network™ http://seclist.us/nishang-v0-7-0-powershell-for-penetration-testing-and-offensive-security.html … -
[Blog] Executing SQL Queries from Antak Webshell.
#Nishang#PowerShell#InfoSec http://www.labofapenetrationtester.com/2015/08/executing-sql-queries-from-antak.html … -
So much
#Nishang Invoke-PowerShellTcp.ps1 today that I got sick of it and wrote a parser for the bot. https://twitter.com/ScumBots/status/1220945540021735424 … -
And an Arsenal session on
#Nishang as well :)#PowerShell https://www.blackhat.com/us-16/arsenal.html#nishang-the-goodness-of-offensive-powershell … -
To each his own. Amazing Tools. Black Hat Arsenal Europe 2015 Line-Up I'm starting with
#nishang How about you? -- http://www.toolswatch.org/2015/10/black-hat-arsenal-europe-2015-line-up/ … -
DNS TXT Pwnage module is legit for creating file-less malware. Using a DNS server as the c2. Pack with web.client ps1, exfil, and into an excel macro, and you've got a nasty sample
#filelessmalware#nishang#CyberSecurity#powershell#obfuscation#Pentesting
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
-