Rezultati pretraživanja
  1. 2. velj

    PowerSploit- A - is a collection of PowerShell modules that can be used to aid during all phases of an . :-

  2. 30. pro 2019.
  3. 19. pro 2019.
  4. 19. pro 2019.

    with valid attacker plaintext GMail creds.

  5. 19. pro 2019.

    Pentesting 101 [Repo] PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment.

  6. 16. stu 2019.

    is a collection of MS modules that can be used to aid penetration testers during all phases of an assessment...

  7. 31. lis 2019.

    2/n for recon/info-stealing --> for credential dumping/priv esc --> Followed up with C2 connectivity --> BLOODHOUND for domain recon/priv esc --> Complete Domain ownage if possible --> Ransomware variant delivery --> Game Over!

    Prikaži ovu nit
  8. 20. ruj 2019.

    is a collection of modules that can be used to aid penetration testers during all phases of an assessment.

  9. 26. kol 2019.

    WTF is this payload? Looks like CTF but VT flags it 2/70 a74e698026c36801c4e8a55ef45ebd1b32e0a0e542b28f758be56241f4bfb8b6 "I forget where I put the flag, maybe I need to dive deep"

  10. 19. kol 2019.

    GAME OVER: Detecting and Stopping an Operation by Alex Pennino, Matt Bromiley at (POST commands wshell) (dnloader) (bdoor) (Mimikatz variant)

  11. 16. kol 2019.
  12. 10. kol 2019.

    Created a very simple yet efficient to detect 's Reflective DLL Injection module. You can try it out here:

  13. 31. srp 2019.
  14. 29. srp 2019.

    As a pentester, you can leverage to find out information about domain users. These six commands will help you with that.

  15. 29. svi 2019.

    We analyzed a new cluster of PowerShell loaders used by to execute various custom malware into-memory only. The loader is based on the Penetration testing framework . Payloads include a RPC backdoor and a PowerShell backdoor abusing OneDrive as C&C server.

  16. 22. svi 2019.

    just finished an assessment using , and . Once again we introduced our customer in such great technologies, awesome tools and found a lot of open spots which we can mitigate now 😀.

  17. 3. tra 2019.

    How to Control Nearly any Windows Computer with Powersploit

  18. 25. ožu 2019.

    The uses to load modules and binaries in memory. The binaries can be executed directly from memory with 's: Invoke-ReflectivePEInjection

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.