Information Security
414 subscribers
157 photos
5 videos
9 files
2.28K links
Information Security News

we are @sec_nerd twin brother
Download Telegram
Simple MSBuild payload to pull in and execute an externally hosted .net assembly in memory, using a modified version of the code from @anthemtotheego's SharpCradle project. Allows for assembly execution without a PE having to touch disk.

https://gist.github.com/G0ldenGunSec/62b8166c23573fc64c6eeb29e8c5b818
Blacklist3r : Audit/pwn an application using pre-shared Machine Keys :

https://www.notsosecure.com/project-blacklist3r/
RomHack_2018_Andrea_Pierini_whoami.pdf
2.2 MB
show me your privileges and I will lead you to SYSTEM
Aggressor scripts for use with Cobalt Strike 3.0+

custom_payload_generator - creates various payloads for Cobalt Strike's Beacon. Current payload formats:

MSBuild .xml
JSC .js
Windows JScript .js (for wscript or cscript)


https://github.com/offsecginger/AggressorScripts
automato.rb

automato uses native LDAP libraries to automate the collection and enumeration of various directory objects. This is incredibly useful during an internal penetration test.

automato can also conduct password spraying attacks, and identify if a user is a local administrator against any number of systems.


https://github.com/skahwah/automato
If you haven't played with the (relatively) new automated encoding detection feature, aka "Magic", in CyberChef, throw an encoded PowerShell script into it this weekend. https://buff.ly/2BJy8u5
Revealing software-breakpoints from memory [linux version]

https://www.matteomalvica.com/blog/2018/12/02/revealing-software-breakpoints/