Manual Mapping DLL Injection Tutorial
https://www.youtube.com/watch?v=qzZTXcBu3cE
https://www.youtube.com/watch?v=EXRm7tCOwGg
https://www.youtube.com/watch?v=c8B--5lKbNg
https://www.youtube.com/watch?v=_7SvkCGE67M
https://www.youtube.com/watch?v=qzZTXcBu3cE
https://www.youtube.com/watch?v=EXRm7tCOwGg
https://www.youtube.com/watch?v=c8B--5lKbNg
https://www.youtube.com/watch?v=_7SvkCGE67M
YouTube
Manual Mapping DLL Injection Tutorial - How to Manual Map 1of4
🔥 Learn How To Manually Map a DLL Like a Pro & Bypass Anticheats
👨💻 Buy Our Courses: https://guidedhacking.com/register/
💰 Donate on Patreon: https://patreon.com/guidedhacking
❤️ Follow us on Social Media: https://linktr.ee/guidedhacking
🔗 Article Link:…
👨💻 Buy Our Courses: https://guidedhacking.com/register/
💰 Donate on Patreon: https://patreon.com/guidedhacking
❤️ Follow us on Social Media: https://linktr.ee/guidedhacking
🔗 Article Link:…
Privilege Escalation & Post-Exploitation
https://rmusser.net/docs/Privilege%20Escalation%20&%20Post-Exploitation.html
https://rmusser.net/docs/Privilege%20Escalation%20&%20Post-Exploitation.html
SleuthQL Description
SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque variables were identified.
https://github.com/RhinoSecurityLabs/SleuthQL
https://youtu.be/Sp3FevOAmCs
SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque variables were identified.
https://github.com/RhinoSecurityLabs/SleuthQL
https://youtu.be/Sp3FevOAmCs
GitHub
GitHub - RhinoSecurityLabs/SleuthQL: Python3 Burp History parsing tool to discover potential SQL injection points. To be used in…
Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap. - RhinoSecurityLabs/SleuthQL
RID HIJACKING: Maintaining Access on Windows Machines #DerbyCon
https://github.com/r4wd3r/RID-Hijacking/blob/master/slides/derbycon-8.0/RID_HIJACKING_DERBYCON_2018.pdf
https://github.com/r4wd3r/RID-Hijacking/blob/master/slides/derbycon-8.0/RID_HIJACKING_DERBYCON_2018.pdf
GitHub
r4wd3r/RID-Hijacking
Windows RID Hijacking persistence technique. Contribute to r4wd3r/RID-Hijacking development by creating an account on GitHub.
Building Your Own Dedicated IPSEC VPN in Less Than 10 Minutes
https://danielmiessler.com/blog/building-your-own-dedicated-ipsec-vpn-in-less-than-10-minutes/
https://danielmiessler.com/blog/building-your-own-dedicated-ipsec-vpn-in-less-than-10-minutes/
How to bypass AMSI and execute ANY malicious Powershell code
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
zc00l blog
How to bypass AMSI and execute ANY malicious Powershell code
Hello again. In my previous posts I detailed how to manually get SYSTEM shell from Local Administrators users. That’s interesting but very late game during a penetration assessment as it is presumed that you already owned the target machine.
Lateral Movement using WSHController/WSHRemote objects (IWSHController and IWSHRemote interfaces)
http://www.hexacorn.com/blog/2018/08/18/lateral-movement-using-wshcontroller-wshremote-objects-iwshcontroller-and-iwshremote-interfaces/
http://www.hexacorn.com/blog/2018/08/18/lateral-movement-using-wshcontroller-wshremote-objects-iwshcontroller-and-iwshremote-interfaces/