Code injection on Windows using Python: a simple example
https://www.andreafortuna.org/programming/code-injection-on-windows-using-python-a-simple-example/
  
  https://www.andreafortuna.org/programming/code-injection-on-windows-using-python-a-simple-example/
So Long, and Thanks for All the Fish
  
  Code injection on Windows using Python: a simple example
  Recently i had to perform some comparative tests on a couple of whitelisting solutions. One of the crucial step of the test was the proper functioning of memory monitoring feature, useful in case o…
  Injecting Shellcode into a Remote Process with Python
https://www.christophertruncer.com/injecting-shellcode-into-a-remote-process-with-python/
  
  https://www.christophertruncer.com/injecting-shellcode-into-a-remote-process-with-python/
Christopher Truncer's Website
  
  Injecting Shellcode into a Remote Process with Python
  In order to inject shellcode into a remote process, we’re going to have to interact with the Windows API, and it’s actually going to be fairly simple to do.  To start off, you need to check that yo…
  Manual Mapping DLL Injection Tutorial
https://www.youtube.com/watch?v=qzZTXcBu3cE
https://www.youtube.com/watch?v=EXRm7tCOwGg
https://www.youtube.com/watch?v=c8B--5lKbNg
https://www.youtube.com/watch?v=_7SvkCGE67M
  
  https://www.youtube.com/watch?v=qzZTXcBu3cE
https://www.youtube.com/watch?v=EXRm7tCOwGg
https://www.youtube.com/watch?v=c8B--5lKbNg
https://www.youtube.com/watch?v=_7SvkCGE67M
YouTube
  
  Manual Mapping DLL Injection Tutorial - How to Manual Map 1of4
  🔥 Learn How To Manually Map a DLL Like a Pro & Bypass Anticheats
👨💻 Buy Our Courses: https://guidedhacking.com/register/
💰 Donate on Patreon: https://patreon.com/guidedhacking
❤️ Follow us on Social Media: https://linktr.ee/guidedhacking
🔗 Article Link:…
  👨💻 Buy Our Courses: https://guidedhacking.com/register/
💰 Donate on Patreon: https://patreon.com/guidedhacking
❤️ Follow us on Social Media: https://linktr.ee/guidedhacking
🔗 Article Link:…
Privilege Escalation & Post-Exploitation
https://rmusser.net/docs/Privilege%20Escalation%20&%20Post-Exploitation.html
  https://rmusser.net/docs/Privilege%20Escalation%20&%20Post-Exploitation.html
SleuthQL Description
SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque variables were identified.
https://github.com/RhinoSecurityLabs/SleuthQL
https://youtu.be/Sp3FevOAmCs
  
  SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque variables were identified.
https://github.com/RhinoSecurityLabs/SleuthQL
https://youtu.be/Sp3FevOAmCs
GitHub
  
  GitHub - RhinoSecurityLabs/SleuthQL: Python3 Burp History parsing tool to discover potential SQL injection points. To be used in…
  Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap. - RhinoSecurityLabs/SleuthQL
  RID HIJACKING: Maintaining Access on Windows Machines #DerbyCon
https://github.com/r4wd3r/RID-Hijacking/blob/master/slides/derbycon-8.0/RID_HIJACKING_DERBYCON_2018.pdf
  
  https://github.com/r4wd3r/RID-Hijacking/blob/master/slides/derbycon-8.0/RID_HIJACKING_DERBYCON_2018.pdf
GitHub
  
  r4wd3r/RID-Hijacking
  Windows RID Hijacking persistence technique. Contribute to r4wd3r/RID-Hijacking development by creating an account on GitHub.
  Building Your Own Dedicated IPSEC VPN in Less Than 10 Minutes
https://danielmiessler.com/blog/building-your-own-dedicated-ipsec-vpn-in-less-than-10-minutes/
  https://danielmiessler.com/blog/building-your-own-dedicated-ipsec-vpn-in-less-than-10-minutes/
How to bypass AMSI and execute ANY malicious Powershell code
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
  
  https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
zc00l blog
  
  How to bypass AMSI and execute ANY malicious Powershell code
  Hello again. In my previous posts I detailed how to manually get SYSTEM shell from Local Administrators users. That’s interesting but very late game during a penetration assessment as it is presumed that you already owned the target machine.
  Lateral Movement using WSHController/WSHRemote objects (IWSHController and IWSHRemote interfaces)
http://www.hexacorn.com/blog/2018/08/18/lateral-movement-using-wshcontroller-wshremote-objects-iwshcontroller-and-iwshremote-interfaces/
  http://www.hexacorn.com/blog/2018/08/18/lateral-movement-using-wshcontroller-wshremote-objects-iwshcontroller-and-iwshremote-interfaces/