Windows TCP/IP Denial of Service Vulnerability
#DOS #Vulnerability #Windows #CVE-2021-24086 #DenialofService
https://reconshell.com/windows-tcp-ip-denial-of-service-vulnerability/
#DOS #Vulnerability #Windows #CVE-2021-24086 #DenialofService
https://reconshell.com/windows-tcp-ip-denial-of-service-vulnerability/
Penetration Testing Tools, ML and Linux Tutorials
Windows TCP/IP Denial of Service Vulnerability - Penetration Testing Tools, ML and Linux Tutorials
This is a proof of concept for CVE-2021-24086 ("Windows TCP/IP Denial of Service Vulnerability "), a NULL dereference in tcpip.sys patched by Microsoft in
Wconsole - Script for Windows Penetration Testing
#Windows #PenetrationTesting #Enumeration #VAPT
https://reconshell.com/wconsole-script-for-windows-penetration-testing/
#Windows #PenetrationTesting #Enumeration #VAPT
https://reconshell.com/wconsole-script-for-windows-penetration-testing/
Penetration Testing Tools, ML and Linux Tutorials
Wconsole - Script for Windows Penetration Testing - Penetration Testing Tools, ML and Linux Tutorials
it's in simbaly words its collection of commands for check OS Version,Configuration and Enumeration it's not knife swiss army but it's Hand-Script for
WFH - Windows Feature Hunter
#COMhijacking #Windows #WFH #hijacking #vulnerabilities
https://reconshell.com/wfh-windows-feature-hunter/
#COMhijacking #Windows #WFH #hijacking #vulnerabilities
https://reconshell.com/wfh-windows-feature-hunter/
Penetration Testing Tools, ML and Linux Tutorials
WFH - Windows Feature Hunter - Penetration Testing Tools, ML and Linux Tutorials
Windows Feature Hunter (WFH) is a proof of concept python script that uses Frida, a dynamic instrumentation toolkit, to assist in potentially identifying
CredPhish - PowerShell script designed to invoke legitimate credential prompts
#CredPhish #PowerShell #DNSexfiltration #Phishing #Windows
https://reconshell.com/credphish-powershell-script-designed-to-invoke-legitimate-credential-prompts/
#CredPhish #PowerShell #DNSexfiltration #Phishing #Windows
https://reconshell.com/credphish-powershell-script-designed-to-invoke-legitimate-credential-prompts/
Penetration Testing Tools, ML and Linux Tutorials
CredPhish - PowerShell script designed to invoke legitimate credential prompts - Penetration Testing Tools, ML and Linux Tutorials
CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user
ScareCrow - Payload creation framework designed around EDR bypass
#Windows #ScareCrow #Payload #EDR #EDRbypass
https://reconshell.com/scarecrow-payload-creation-framework-designed-around-edr-bypass/
#Windows #ScareCrow #Payload #EDR #EDRbypass
https://reconshell.com/scarecrow-payload-creation-framework-designed-around-edr-bypass/
Penetration Testing Tools, ML and Linux Tutorials
ScareCrow - Payload creation framework designed around EDR bypass. - Penetration Testing Tools, ML and Linux Tutorials
If you want to learn more about the techniques utilized in this framework please take a look at Part 1 and Part 2
pybotnet - BackDoor for Windows and Linux with Telegram control panel
#Backdoor #Trojan #keylogger #ReverseShell #Windows #Linux #Botnet
https://reconshell.com/pybotnet-backdoor-for-windows-and-linux-with-telegram-control-panel/
#Backdoor #Trojan #keylogger #ReverseShell #Windows #Linux #Botnet
https://reconshell.com/pybotnet-backdoor-for-windows-and-linux-with-telegram-control-panel/
Penetration Testing Tools, ML and Linux Tutorials
pybotnet - BackDoor for Windows and Linux with Telegram control panel - Penetration Testing Tools, ML and Linux Tutorials
Sample GUI Trojan created by pybotnet: VINET
Installer File TakeOver
#PrivilegeEscalation #WindowsExploit #Hacking
#AppSec #InfoSec #CVEs #Windows #security #RedTeam
https://reconshell.com/installer-file-takeover/
#PrivilegeEscalation #WindowsExploit #Hacking
#AppSec #InfoSec #CVEs #Windows #security #RedTeam
https://reconshell.com/installer-file-takeover/
Penetration Testing Tools, ML and Linux Tutorials
Installer File TakeOver - Penetration Testing Tools, ML and Linux Tutorials
I have also made sure that the proof of concept is extremely reliable and doesn't require anything, so it works in every attempt. The proof of concept
Installer File TakeOver
#PrivilegeEscalation #WindowsExploit #Hacking
#AppSec #InfoSec #CVEs #Windows #security #RedTeam
https://reconshell.com/installer-file-takeover/
#PrivilegeEscalation #WindowsExploit #Hacking
#AppSec #InfoSec #CVEs #Windows #security #RedTeam
https://reconshell.com/installer-file-takeover/
Penetration Testing Tools, ML and Linux Tutorials
Installer File TakeOver - Penetration Testing Tools, ML and Linux Tutorials
I have also made sure that the proof of concept is extremely reliable and doesn't require anything, so it works in every attempt. The proof of concept
PowerShell Resources
#RedTeam #PenetrationTesting #OffensiveSecurity
#PostExploitation #Powershell #Microsoft #Windows
https://reconshell.com/powershell-resources/
#RedTeam #PenetrationTesting #OffensiveSecurity
#PostExploitation #Powershell #Microsoft #Windows
https://reconshell.com/powershell-resources/
Penetration Testing Tools, ML and Linux Tutorials
PowerShell Resources - Penetration Testing Tools, ML and Linux Tutorials
A curated list of delightful PowerShell packages and resources.
Windows Subsystem for Linux (WSL)
#Linux #WSL #Windows #Microsoft
#OffensiveSecurity #shell #KaliLinux
https://reconshell.com/awesome-wsl/
#Linux #WSL #Windows #Microsoft
#OffensiveSecurity #shell #KaliLinux
https://reconshell.com/awesome-wsl/
Penetration Testing Tools, ML and Linux Tutorials
Awesome WSL - Penetration Testing Tools, ML and Linux Tutorials
Windows is a family of proprietary operating systems, all of which are developed, marketed, and sold by Microsoft. Currently Windows 10 is Microsoft's