Investigating Subversive PowerShell Profiles
https://web.archive.org/web/20151116221721/https://www.exploit-monday.com/2015/11/investigating-subversive-powershell.html
OLD but GOLD 😁
#powershell , #old_but_gold
https://web.archive.org/web/20151116221721/https://www.exploit-monday.com/2015/11/investigating-subversive-powershell.html
OLD but GOLD 😁
#powershell , #old_but_gold
🤔2
decoded PowerShell script that perform C2 connection. The script decodes and executes commands received from a C2 server by using R64Decoder Function.
credit : @whichbuffer
this tool was used by an APT to target @bellingcat
https://gist.github.com/whichbuffer/22621545f9f5a1d946affd34f6659e64
#c2 , #powershell , #tool
credit : @whichbuffer
https://gist.github.com/whichbuffer/22621545f9f5a1d946affd34f6659e64
#c2 , #powershell , #tool
❤🔥2
PSRansom: a PowerShell Ransomware Simulator with C2 Server capabilities.
https://github.com/JoelGMSec/PSRansom
#c2 , #powershell , #simulat , #tool
———
@islemolecule_source
https://github.com/JoelGMSec/PSRansom
#c2 , #powershell , #simulat , #tool
———
@islemolecule_source
PS_Automation_Scripting.pdf
16.3 MB
"PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers", 2023.
#powershell
———
@islemolecule_source
#powershell
———
@islemolecule_source
👏4