EDM proxy for infecting files on-the-fly
Offensive Proxy server
POC for infecting PE files, ZIP files, Office documents on the fly during a HTTP MitM.
https://github.com/LeonardoNve/edm
#wtf
#mitm
#windows
@sec_nerd_en
Offensive Proxy server
POC for infecting PE files, ZIP files, Office documents on the fly during a HTTP MitM.
https://github.com/LeonardoNve/edm
#wtf
#mitm
#windows
@sec_nerd_en
GitHub
LeonardoNve/edm
Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2 - LeonardoNve/edm
Use PowerShell to Find the History of USB Flash Drive Usage
https://blogs.technet.microsoft.com/heyscriptingguy/2012/05/18/use-powershell-to-find-the-history-of-usb-flash-drive-usage/
#windows
#ps
#enum
@sec_nerd_en
https://blogs.technet.microsoft.com/heyscriptingguy/2012/05/18/use-powershell-to-find-the-history-of-usb-flash-drive-usage/
#windows
#ps
#enum
@sec_nerd_en
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html
#Windows_API_Hooking
#Malware
#PoC
#Windows_API_Hooking
#Malware
#PoC
Malwaretech
Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)
We’ll be writing a hooking engine using trampoline based hooks as explained in the previous article (we don’t handle relative instructions as they’re very rare, but we do use atomic write operations to prevent race conditions).
First things first, we need…
First things first, we need…
Windows Process Injection: PROPagate
https://modexp.wordpress.com/2018/08/23/process-injection-propagate/
#windows
#exploit
@sec_nerd_en
https://modexp.wordpress.com/2018/08/23/process-injection-propagate/
#windows
#exploit
@sec_nerd_en
modexp
Windows Process Injection: PROPagate
Introduction In October 2017, Adam at Hexacorn published details of a process injection technique called PROPagate. In his post, he describes how any process that uses subclassed windows has the po…
Attack Methods for Gaining Domain Admin Rights in Active Directory
https://adsecurity.org/?p=2362
#windows
#ad
@sec_nerd_en
https://adsecurity.org/?p=2362
#windows
#ad
@sec_nerd_en
Just released a new #mimikatz version to support Windows 10 1803 to bypass the Credential Guard authentication chain
https://github.com/gentilkiwi/mimikatz/releases
#windows
#mimikatz
https://github.com/gentilkiwi/mimikatz/releases
#windows
#mimikatz