Tactics of Red Teamers ( and then some)

تاكتيك هاي تيم هاي قرمز و وحشي

1. Windows Local Privilege Escalation from Service Account to System
https://github.com/antonioCoco/RogueWinRM

2. .NET35/45 AD post-exploitation toolkit
https://github.com/FuzzySecurity/StandIn

3. Run PowerShell w rundll32. Bypass software restrictions
https://github.com/p3nt4/PowerShdll

4.Bypassing Windows protection mechanisms & Playing with OffensiveNim
https://s3cur3th1ssh1t.github.io/Playing-with-OffensiveNim

5. Forging malicious DOC, undetected by all VirusTotal static engines
https://arielkoren.com/blog/2020/12/24/forging-malicious-doc

6.Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams
https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams

7. Investigate Google Accounts with emails
https://github.com/mxrch/GHunt

8 Linux/x86 reverse TCP shellcode
https://packetstormsecurity.com/files/160734/114linuxx86reverse-shellcode.txt

-آگاهي رساني امنيت سايبري-

Categories: