0 0
Read Time:44 Second

تاكتيك هاي تيم هاي قرمز و وحشي

1. Windows Local Privilege Escalation from Service Account to System
https://github.com/antonioCoco/RogueWinRM

2. .NET35/45 AD post-exploitation toolkit
https://github.com/FuzzySecurity/StandIn

3. Run PowerShell w rundll32. Bypass software restrictions
https://github.com/p3nt4/PowerShdll

4.Bypassing Windows protection mechanisms & Playing with OffensiveNim
https://s3cur3th1ssh1t.github.io/Playing-with-OffensiveNim

5. Forging malicious DOC, undetected by all VirusTotal static engines

Protected: Forging malicious DOC, undetected by all VirusTotal static engines

6.Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams
https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams

7. Investigate Google Accounts with emails
https://github.com/mxrch/GHunt

8 Linux/x86 reverse TCP shellcode
https://packetstormsecurity.com/files/160734/114linuxx86reverse-shellcode.txt

-آگاهي رساني امنيت سايبري-

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence