Eternalrelayx.py — Non-Admin NTLM Relaying & ETERNALBLUE Exploitation
https://medium.com/@technicalsyn/eternalrelayx-py-non-admin-ntlm-relaying-eternalblue-exploitation-dab9e2b97337
https://medium.com/@technicalsyn/eternalrelayx-py-non-admin-ntlm-relaying-eternalblue-exploitation-dab9e2b97337
Medium
eternalrelayx.py — Non-Admin NTLM Relaying & ETERNALBLUE Exploitation
Introduction
Malware Development – Welcome to the Dark Side:-
Part 1:-
https://t.co/RVBbo3Opmt
Part 2-1 –
https://t.co/v9etUcVUw6
Part 2-2:-
https://t.co/KzCqxNzz6K
Part 3:-
https://t.co/3wAwYkWO6W
Part 4:-
https://t.co/jq2ZIrMuUz
Part 1:-
https://t.co/RVBbo3Opmt
Part 2-1 –
https://t.co/v9etUcVUw6
Part 2-2:-
https://t.co/KzCqxNzz6K
Part 3:-
https://t.co/3wAwYkWO6W
Part 4:-
https://t.co/jq2ZIrMuUz
MacShell Post Exploitation Tool - Red Teaming with a Blue Team Mentaility - Medium
https://medium.com/red-teaming-with-a-blue-team-mentaility/macshell-post-exploitation-tool-41696be9d826
https://medium.com/red-teaming-with-a-blue-team-mentaility/macshell-post-exploitation-tool-41696be9d826
Medium
MacShell Post Exploitation Tool
This is a follow-up to the post I previously wrote about the process I went through to write my own macOS post exploitation tool. Here is…
Minute Hack: Get SSH login notification on Telegram
https://8192.one/post/ssh_login_notification_withtelegram/
https://8192.one/post/ssh_login_notification_withtelegram/
How to enable DNS-over-HTTPS (DoH) in Firefox | ZDNet
https://www.zdnet.com/google-amp/article/how-to-enable-dns-over-https-doh-in-firefox/?__twitter_impression=true
https://www.zdnet.com/google-amp/article/how-to-enable-dns-over-https-doh-in-firefox/?__twitter_impression=true
ZDNet
How to enable DNS-over-HTTPS (DoH) in Firefox
A step by step guide to enable DNS-over-HTTPS (DoH) support in the Firefox browser.
Linux for Pentester: git Privilege Escalation
https://www.hackingarticles.in/linux-for-pentester-git-privilege-escalation/
https://www.hackingarticles.in/linux-for-pentester-git-privilege-escalation/
Hacking Articles
Linux for Pentester: git Privilege Escalation - Hacking Articles
In this article, we will understand a very dominant command i.e “git” which is use in version control of software development for controlling source code
GitHub - enovella/jebscripts: A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
https://github.com/enovella/jebscripts
https://github.com/enovella/jebscripts
GitHub
GitHub - enovella/jebscripts: A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code - enovella/jebscripts
Executing Code Using Microsoft Teams Updater | Trustwave
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/executing-code-using-microsoft-teams-updater/
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/executing-code-using-microsoft-teams-updater/
Awesome-Cellular-Hacking/README.md at master · W00t3k/Awesome-Cellular-Hacking · GitHub
https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/README.md
https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/README.md
GitHub
Awesome-Cellular-Hacking/README.md at master · W00t3k/Awesome-Cellular-Hacking
Awesome-Cellular-Hacking. Contribute to W00t3k/Awesome-Cellular-Hacking development by creating an account on GitHub.
Red Team Diary, Entry #1: Making NSA’s PeddleCheap RAT Invisible
https://medium.com/@d.bougioukas/red-team-diary-entry-1-making-nsas-peddlecheap-rat-invisible-f88ccbdc484d
https://medium.com/@d.bougioukas/red-team-diary-entry-1-making-nsas-peddlecheap-rat-invisible-f88ccbdc484d
Medium
Red Team Diary, Entry #1: Making NSA’s PeddleCheap RAT Invisible
A/V | EDR evasion using a RAMDisk and a custom PE loader
Android 8.1 in qemu and Burp Suite SSL interception | Astr0baby's not so random thoughts _____ rand() % 100;
https://astr0baby.wordpress.com/2019/07/09/android-8-1-in-qemu-and-burp-suite-ssl-interception/
https://astr0baby.wordpress.com/2019/07/09/android-8-1-in-qemu-and-burp-suite-ssl-interception/
Astr0baby's not so random thoughts _____ rand() % 100;
Android 8.1 in qemu and Burp Suite SSL interception
In this exercise we will run the latest Android Oreo (8.1.0) x86_64 under KVM accelerated Qemu and forward all internet traffic from the Android through Burp Suite running on our Linux x86_64 host.…
Orange: Attacking SSL VPN - Part 1: PreAuth RCE on Palo Alto GlobalProtect, with Uber as Case Study!
https://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html?fbclid=IwAR1QV5uA2VaStsGlOjrUMnx657aUz1XWzbBQ0xwxbYuaD_Mk9HNPMAAAc6s&m=1
https://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html?fbclid=IwAR1QV5uA2VaStsGlOjrUMnx657aUz1XWzbBQ0xwxbYuaD_Mk9HNPMAAAc6s&m=1
Orange
Attacking SSL VPN - Part 1: PreAuth RCE on Palo Alto GlobalProtect, with Uber as Case Study!
This is 🍊 speaking