fckn good article on powershell obfuscation
https://www.offensive-security.com/offsec/powershell-obfuscation/
https://www.offensive-security.com/offsec/powershell-obfuscation/
OffSec
PowerShell Obfuscation | OffSec
Community moderator Tristram (gh0x0st) shares with us an approach to scripting payload obfuscation via PowerShell in order to avoid AV and AMSI detection.
Forwarded from 0lab channel ™
#Red_Team_Tactics
1. Scraping Login Credentials With XSS
https://www.trustedsec.com/blog/scraping-login-credentials-with-xss
2. UAC bypass, Elevate, Persistence methods
https://github.com/rootm0s/WinPwnage
1. Scraping Login Credentials With XSS
https://www.trustedsec.com/blog/scraping-login-credentials-with-xss
2. UAC bypass, Elevate, Persistence methods
https://github.com/rootm0s/WinPwnage
TrustedSec
Scraping Login Credentials With XSS
We'll use a reflected XSS vulnerability to frame the application login page in the IFrame trap, scrape the credentials from the login form as the victim…
Forwarded from 0lab channel ™
#hardening
1. Blocking ISO mounting
https://malicious.link/post/2022/blocking-iso-mounting
2. Windows 11 x64 Security Hardening Guide
https://github.com/beerisgood/Windows11_Hardening
3. Exploit Protection Settings
https://github.com/jdgregson/Exploit-Protection-Settings
Share and support us <3
1. Blocking ISO mounting
https://malicious.link/post/2022/blocking-iso-mounting
2. Windows 11 x64 Security Hardening Guide
https://github.com/beerisgood/Windows11_Hardening
3. Exploit Protection Settings
https://github.com/jdgregson/Exploit-Protection-Settings
Share and support us <3
My cool site
Blocking ISO mounting
Update: 10/15/2022
One of the hard parts of implementing a block like this is the concern that it will “break something”. The DFIR Report’s post on Bumblebee Round 2 has a great suggestion on how to detect legitimate (and illegitimate) use of ISO mounting…
One of the hard parts of implementing a block like this is the concern that it will “break something”. The DFIR Report’s post on Bumblebee Round 2 has a great suggestion on how to detect legitimate (and illegitimate) use of ISO mounting…
Verifica utilizando métodos usados em malwares se a máquina em questão é uma VM
https://github.com/a0rtega/pafish
Script para ofuscar detecção de VM no VirtualBox
https://github.com/d4rksystem/VBoxCloak
https://github.com/a0rtega/pafish
Script para ofuscar detecção de VM no VirtualBox
https://github.com/d4rksystem/VBoxCloak
GitHub
GitHub - a0rtega/pafish: Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis…
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do - a0rtega/pafish
The_Rootkit_Arsenal_Escape_and_Evasion_in_the_Dark_Corners_of_the.pdf
106.1 MB
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
/archive/
https://nitter.net/felipepayao/status/1565421522411462665
The Tech Outlook
Access to Brazilian Government network on sale by Everest ransom team
A Twitter post by the Twitter handle @DailyDarkWeb has informed that a ransom team is facilitating sale of unauthorized access for Brazilian Government. The name of the Ransom team is Everest. The Twitter handle @DailyDarkWeb shared a screenshot of the update…
IMPERFECT HATRED.zip
56.1 MB
OST from the game Ultrakill (the best game in the entire existence).
Metadata added by myself.
Metadata added by myself.
❤1