Red Teaming .. https://github.com/SpiderLabs/DoHC2
GitHub
GitHub - SpiderLabs/DoHC2: DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be…
DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2) via DNS over HTTPS (DoH). - SpiderLabs/DoHC2
Forwarded from Ivan Chavero
antes que nada disculpen el spam pero está cabrón esta onda del youtube, espero que les guste la nueva rola de mi banda Seis Pistos
https://www.youtube.com/watch?v=l5iD9eqr6IM
https://www.youtube.com/watch?v=l5iD9eqr6IM
YouTube
Seis Pistos SuperCero ft. Lng/Sht
Super Cero de Seis Pistos ft. LNG/Sht producito por Tito Fuentes
Síguenos en:
Spotify: https://open.spotify.com/track/6rtVQQ9BlEszAaMHBmhrHg
Twtiter: https://twitter.com/seispistos
Instagram: https://www.instagram.com/seis_pistos/
Letra:
Antes peleaba mas…
Síguenos en:
Spotify: https://open.spotify.com/track/6rtVQQ9BlEszAaMHBmhrHg
Twtiter: https://twitter.com/seispistos
Instagram: https://www.instagram.com/seis_pistos/
Letra:
Antes peleaba mas…
The PoC dropper/malware example from @dafthack and my Covert Attack Mystery Box. Weaponized Windows Kernel WNF for side-channel data persistence
https://github.com/ustayready/CasperStager
https://github.com/ustayready/CasperStager
GitHub
GitHub - ustayready/CasperStager: PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low…
PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls. - ustayready/CasperStager
Technical Rundown of WebExec (CVE-2018-15442) - Cisco Webex Meetings Desktop App for Windows RCE with SYSTEM privileges https://blog.skullsecurity.org/2018/technical-rundown-of-webexec
Pocos lugares para el curso Web Penetration Tester en #CDMX. !!
El 8 y 9 de Noviembre !!
Más información en :
https://tpx.mx/cursos/web-penetration-tester/cdmx
El 8 y 9 de Noviembre !!
Más información en :
https://tpx.mx/cursos/web-penetration-tester/cdmx
PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.
https://github.com/ustayready/CasperStager
https://github.com/ustayready/CasperStager
GitHub
GitHub - ustayready/CasperStager: PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low…
PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls. - ustayready/CasperStager
Bypassing AMSI and execute any malicious PowerShell code
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
https://0x00-0x00.github.io/research/2018/10/28/How-to-bypass-AMSI-and-Execute-ANY-malicious-powershell-code.html
zc00l blog
How to bypass AMSI and execute ANY malicious Powershell code
Hello again. In my previous posts I detailed how to manually get SYSTEM shell from Local Administrators users. That’s interesting but very late game during a penetration assessment as it is presumed that you already owned the target machine.
Hyper -V explotation
https://www.youtube.com/watch?v=8RCH0vFxWT4
https://www.youtube.com/watch?v=8RCH0vFxWT4
YouTube
BlueHat v18 || Hardening hyper-v through offensive security research
Jugal Parikh, Microsoft
Holly Stewart, Microsoft
Humans are susceptible to social engineering. Machines are susceptible to tampering. Machine learning is vulnerable to adversarial attacks. Singular machine learning models can be “gamed” leading to unexpected…
Holly Stewart, Microsoft
Humans are susceptible to social engineering. Machines are susceptible to tampering. Machine learning is vulnerable to adversarial attacks. Singular machine learning models can be “gamed” leading to unexpected…
hacker mexicano enseña a evitar ataques a sistemas de pagos digitales.
https://www.america-retail.com/ecommerce/ecommerce-hacker-mexicano-ensena-a-evitar-ataques-a-sistemas-de-pagos-digitales/
Te interesa un curso de seguridad NFC : https://tpx.mx/cursos/nfc-hacking
https://www.america-retail.com/ecommerce/ecommerce-hacker-mexicano-ensena-a-evitar-ataques-a-sistemas-de-pagos-digitales/
Te interesa un curso de seguridad NFC : https://tpx.mx/cursos/nfc-hacking
America-Retail
eCommerce: hacker mexicano enseña a evitar ataques a sistemas de pagos digitales | América Retail
Alguna vez pensaste en ser un profesional del League Of Legends? Te gustaría vivir la experiencia? vivir en una gaming house? ser entrenado por un coach profesional? Tu oportunidad ha llegado la escuadra del Team Ørdo Equitum te ofrece esto y mucho más. Se parte de nuestro BootCamp donde podrás aprender lo mejor de nuestros profesionales, conoce tus límites y superalos, un entrenamiento dinámico para mejorar tus técnicas y conocimientos en la práctica y teoría del juego. Cupo limitado. Para mayor información comunícate por : Teléfono móvil : +52 5526563983 Correo : esordoequitum@gmail.com #OrdoFighting #GoØrdo #GoOrdo Nuestras redes: https://www.facebook.com/TeamOrdoEquitum/ https://twitter.com/Ordo_Equitum https://www.instagram.com/ordo_equitum/ https://www.facebook.com/nasthalkwaii/