Metasploit Cheat Sheet by Tim Keary
#Metasploit #Meterpreter #msfvenom #shellcode #Networking
https://upurl.me/kj47x
#Metasploit #Meterpreter #msfvenom #shellcode #Networking
https://upurl.me/kj47x
Mapping-Injection Another Windows Process Injection
#ProcessInjection #MappingInjection #shellcode
https://upurl.me/9q3ml
#ProcessInjection #MappingInjection #shellcode
https://upurl.me/9q3ml
Penetration Testing Tools, ML and Linux Tutorials
Mapping-Injection Another Windows Process Injection - Penetration Testing Tools, ML and Linux Tutorials
Mapping injection is a process injection technique that avoids the usage of common monitored syscall VirtualAllocEx and WriteProcessMemory.
RdpThief – Extracting Clear Text Passwords from mstsc.exe using API Hooking
#RdpThief #APIHooking #CobaltStrike #shellcode #CyberSecurity #hooking
https://upurl.me/yq27u
#RdpThief #APIHooking #CobaltStrike #shellcode #CyberSecurity #hooking
https://upurl.me/yq27u
Write Windows Shellcode in Rust
#Shellcode #Rust #WindowsShellcode #InfoSec #CyberSecurity
https://reconshell.com/write-windows-shellcode-in-rust/
#Shellcode #Rust #WindowsShellcode #InfoSec #CyberSecurity
https://reconshell.com/write-windows-shellcode-in-rust/
Penetration Testing Tools, ML and Linux Tutorials
Write Windows Shellcode in Rust - Penetration Testing Tools, ML and Linux Tutorials
Windows shellcode project is located in shellcode/, it can build into a PE file with only .text section and has no external dependencies.
OffensivePH - Post Exploitation Tool
#PostExploitation #OffensivePH #Exploitation
#Hacking #shellcode #Hacker
https://reconshell.com/offensiveph-post-exploitation-tool/
#PostExploitation #OffensivePH #Exploitation
#Hacking #shellcode #Hacker
https://reconshell.com/offensiveph-post-exploitation-tool/
BadOutlook - Malicious Outlook Reader
#Shellcode #C2 #Microsoft #Outlook
https://reconshell.com/badoutlook-malicious-outlook-reader/
#Shellcode #C2 #Microsoft #Outlook
https://reconshell.com/badoutlook-malicious-outlook-reader/
Penetration Testing Tools, ML and Linux Tutorials
BadOutlook - Malicious Outlook Reader - Penetration Testing Tools, ML and Linux Tutorials
A simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based on a specific trigger subject line.
charlotte – fully undetected shellcode launcher
#shellcode #msfvenom #XOR #ShellcodeLauncher #CobaltStrike #Payload
https://reconshell.com/charlotte-fully-undetected-shellcode-launcher/
#shellcode #msfvenom #XOR #ShellcodeLauncher #CobaltStrike #Payload
https://reconshell.com/charlotte-fully-undetected-shellcode-launcher/
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
#XOR #Spoofing #Shellcode #ProcessInjection #dropper
https://reconshell.com/sharperner-generate-net-dropper-with-aes-and-xor-obfuscated-shellcode/
Penetration Testing Tools, ML and Linux Tutorials
Sharperner - generate .NET dropper with AES and XOR obfuscated shellcode - Penetration Testing Tools, ML and Linux Tutorials
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass
DNSStager - Hide your payload in DNS
#XOR #Shellcode #payload #DNS #DNSStager
https://reconshell.com/dnsstager-hide-your-payload-in-dns/
#XOR #Shellcode #payload #DNS #DNSStager
https://reconshell.com/dnsstager-hide-your-payload-in-dns/
Penetration Testing Tools, ML and Linux Tutorials
DNSStager - Hide your payload in DNS - Penetration Testing Tools, ML and Linux Tutorials
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS.
EarlyBird - injecting cobalt strike shellcode to powershell
#CobaltStrike #shellcode #powershell #EarlyBird
https://reconshell.com/earlybird-injecting-cobalt-strike-shellcode-to-powershell/
#CobaltStrike #shellcode #powershell #EarlyBird
https://reconshell.com/earlybird-injecting-cobalt-strike-shellcode-to-powershell/
Penetration Testing Tools, ML and Linux Tutorials
EarlyBird - injecting cobalt strike shellcode to powershell - Penetration Testing Tools, ML and Linux Tutorials
EarlyBird: a poc of using the tech with syscalls on powershell.exe injecting cobalt strike shellcode to powershell.exe using EarlyBird Tech USAGE: first get
CobaltStrike BOF - Inject ETW Bypass
#CobaltStrike #ETWBypass #ProcessInjection #BOF
#OSEP #malware #Shellcode #RedTeam #BlueTeam
https://reconshell.com/cobaltstrike-bof-inject-etw-bypass/
#CobaltStrike #ETWBypass #ProcessInjection #BOF
#OSEP #malware #Shellcode #RedTeam #BlueTeam
https://reconshell.com/cobaltstrike-bof-inject-etw-bypass/
Penetration Testing Tools, ML and Linux Tutorials
CobaltStrike BOF - Inject ETW Bypass - Penetration Testing Tools, ML and Linux Tutorials
Running InjectEtwBypass BOF from CobaltStrike to Bypass ETW in Notepad.exe
CopyCat - Simple rapper for Mimikatz bypass Defender
#Shellcode #CopyCat #Mimikatz #bypass #Defender
https://reconshell.com/copycat-simple-rapper-for-mimikatz-bypass-defender/
#Shellcode #CopyCat #Mimikatz #bypass #Defender
https://reconshell.com/copycat-simple-rapper-for-mimikatz-bypass-defender/
Penetration Testing Tools, ML and Linux Tutorials
CopyCat - Simple rapper for Mimikatz bypass Defender - Penetration Testing Tools, ML and Linux Tutorials
Start a cmd shell (with admin priv.) like this and run CopyCat.exe and enjoy Mimikatz (If you are running 64 bit Windows 10)