Lateral Movement using WSHController/WSHRemote objects (IWSHController and IWSHRemote interfaces)
http://www.hexacorn.com/blog/2018/08/18/lateral-movement-using-wshcontroller-wshremote-objects-iwshcontroller-and-iwshremote-interfaces/
http://www.hexacorn.com/blog/2018/08/18/lateral-movement-using-wshcontroller-wshremote-objects-iwshcontroller-and-iwshremote-interfaces/
A website that helps to understand even the wildest C/C++ declarations :) https://cdecl.org
hashcat-brain - A Docker container for running a hashcat brain server
https://hub.docker.com/r/singelet/hashcat-brain/
https://hub.docker.com/r/singelet/hashcat-brain/
We just updated our fork of MSF to the latest version. Meterpreter with DNS tunnel transport. Still not integrated into main branch of Rapid7.... so only fork
https://github.com/defcon-russia/metasploit-framework
https://github.com/defcon-russia/metasploit-payloads
https://asintsov.blogspot.com/2017/12/data-exfiltration-in-metasploit.html
https://github.com/defcon-russia/metasploit-framework
https://github.com/defcon-russia/metasploit-payloads
https://asintsov.blogspot.com/2017/12/data-exfiltration-in-metasploit.html
GitHub
GitHub - defcon-russia/metasploit-framework: Metasploit Framework
Metasploit Framework. Contribute to defcon-russia/metasploit-framework development by creating an account on GitHub.
a Constrained Language Mode implementation of Base64 that can be used in WMI Implant.
https://github.com/FortyNorthSecurity/CLM-Base64/blob/master/CLM-Base64.ps1
https://github.com/FortyNorthSecurity/CLM-Base64/blob/master/CLM-Base64.ps1
GitHub
CLM-Base64/CLM-Base64.ps1 at master · FortyNorthSecurity/CLM-Base64
This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode - CLM-Base64/CLM-Base64.ps1 at master · FortyNorthSecurity/CLM-Base64
This media is not supported in your browser
VIEW IN TELEGRAM
Firefox RCE - Clickjacking feed reader alongside weird Windows file picker behavior.
PoC: https://pastebin.com/raw/hhx1CEm3
PoC: https://pastebin.com/raw/hhx1CEm3
Need an in-memory option for the Rotten Potato exploit? Created "Reflective Potato", simple port for use as a reflective DLL and run entirely in memory! Included Cobalt Strike script and Metasploit module
https://github.com/realoriginal/reflectivepotato
https://github.com/realoriginal/reflectivepotato