Swissky
bd2166027e
GMSA Password + Dart Reverse Shell
2021-03-24 12:44:35 +01:00
cosmin-bianu
13d54a5c24
Fixed Java payload
...
- Declared variables
- Added semicolons at the end of each line
- Fixed the bash command
2021-03-12 13:20:15 +02:00
c14dd49h
ca28c69e67
Update Active Directory Attack.md
2021-02-26 14:14:10 +01:00
Swissky
8d31b7240b
Office Attacks
2021-02-21 20:17:57 +01:00
mpgn
d1c23c5863
Unload the service mimi
2021-02-17 12:21:16 +01:00
mpgn
9be371d793
add mimikatz command to protect a process again after removing the protection
...
fe4e984055/mimikatz/modules/kuhl_m_kernel.c (L99)
2021-02-17 12:15:47 +01:00
Valentín Blanco
73f6ab940c
Update Windows - Privilege Escalation.md
...
Adding WES-NG which is a great and updated replacement for Windows-Exploit-Suggester.
2021-02-10 15:52:41 +01:00
Jakub 'unknow' Mrugalski
9244fe0480
[typo] changed sshs_config to sshd_config
2021-02-05 12:24:49 +01:00
Swissky
092083af5c
AD - Printer Bug + Account Lock
2021-01-29 22:10:22 +01:00
PinkDev1
93769768e2
Added EoP - $PATH Interception
2021-01-28 19:45:54 +00:00
Swissky
01aadf3a44
Alternate Data Stream
2021-01-13 10:22:59 +01:00
lanjelot
5cfa93f98b
Add new cloudsplaining tool to AWS Pentest page
2021-01-12 22:59:37 +11:00
Swissky
3a6ac550b8
DSRM Admin
2021-01-08 23:41:50 +01:00
Tim Gates
7846225bfd
docs: fix simple typo, accound -> account
...
There is a small typo in Methodology and Resources/Active Directory Attack.md.
Should read `account` rather than `accound`.
2020-12-23 09:16:40 +11:00
Swissky
16b207eb0b
LAPS Password
2020-12-20 21:45:41 +01:00
Swissky
67752de6e9
Bronze Bit Attack
2020-12-18 22:38:30 +01:00
lanjelot
e0c745cbf4
Fix AWS duplicated tool enumerate-iam
2020-12-18 22:52:21 +11:00
lanjelot
4b9baf37d3
Add dufflebag tool and cleanup
2020-12-18 22:45:07 +11:00
Swissky
f7e8f515a5
Application Escape and Breakout
2020-12-17 08:56:58 +01:00
lanjelot
4c18e29a6b
Fix links and duplicated nmap and massscan examples
2020-12-13 04:50:59 +11:00
Swissky
73fdd6e218
Mimikatz - Elevate token with LSA protection
2020-12-09 23:33:40 +01:00
Swissky
19a2950b8d
AMSI + Trust
2020-12-08 14:31:01 +01:00
Swissky
78cc68674b
Merge pull request #296 from brnhrd/patch-1
...
Fix table of contents
2020-12-07 17:21:02 +01:00
Swissky
f48ee0bca5
Deepce - Docker Enumeration, Escalation of Privileges and Container Escapes
2020-12-06 18:59:43 +01:00
Swissky
27050f6dd8
MSSQL Server Cheatsheet
2020-12-05 11:37:34 +01:00
Swissky
e13f152b74
AD - Recon
2020-12-02 18:43:13 +01:00
brnhrd
15e44bdfe6
Fix table of contents
2020-12-02 14:19:59 +01:00
lanjelot
bca107cc64
Move duplicated tool references into one place
2020-11-30 01:38:04 +11:00
lanjelot
10e6c075f7
Add tool nccgroup/s3_objects_check
2020-11-30 01:17:15 +11:00
Swissky
b918095775
AzureHound
2020-11-24 12:41:34 +01:00
Abass Sesay
95b07c9e3e
Sorted the list of revshell options
...
Miniscule change because it was grinding my grinding my gears that the list is not sorted :-)
2020-11-14 09:20:49 -08:00
Swissky
bd184487e5
NTLM Hashcat
2020-11-06 16:20:03 +01:00
Swissky
1137bfca8d
Remote Desktop Services Shadowing
2020-10-30 21:10:00 +01:00
Gorgamite
f9389d708b
Added winPEAS to windows privilege escalation tool
...
WinPEAS is a really thorough privesc enumeration tool for windows, you can find it here: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS/winPEASexe
It doesn't auto exploit, but it's rather thorough and effective.
2020-10-29 03:57:40 -07:00
Swissky
db533aabd4
Merge pull request #280 from Gorgamite/master
...
Added LinPEAS to Linux Privesc.
2020-10-29 11:56:44 +01:00
Gorgamite
ff3b45e0b7
Added LinPEAS to Linux Privesc.
...
I very strongly recommend adding LinPEAS to the enumeration tools. LinPEAS is arguably the best linux privesc enumeration tool out there. If you haven't used it, I'd try it out. It highlights all relevant information with color coded text, and you can pass it parameters to control the thoroughness of the scan. You should add WinPEAS for windows privesc as well.
2020-10-29 03:50:05 -07:00
Gorgamite
1b69a3ef73
Update Linux - Privilege Escalation.md
2020-10-29 03:22:08 -07:00
Vincent Gilles
0b90094002
Fix(Docs): Correcting typos on the repo
2020-10-17 22:52:35 +02:00
marcan2020
693349da56
Add Python bind shell
2020-10-17 14:52:36 -04:00
Swissky
5a1ae58a59
Sticky Notes Windows + Cobalt SMB
2020-10-16 11:35:15 +02:00
Swissky
3368084b2d
CS Beacon - SMB Error Code
2020-10-15 17:22:00 +02:00
Swissky
b32f4754d7
Keytab + schtasks
2020-10-15 12:35:05 +02:00
Swissky
913f2d2381
Merge pull request #253 from yoavbls/add-cloudflared
...
Use cloudflared to expose internal services
2020-10-09 10:34:26 +02:00
Swissky
0f098c8a2c
Merge pull request #251 from ritiksahni/patch-1
...
Removed broken link
2020-10-09 10:33:43 +02:00
Swissky
c9be68f0a1
Privilege File Write - Update
2020-10-08 16:51:11 +02:00
Swissky
0df0cc9cf8
Privileged File Write
2020-10-08 16:39:25 +02:00
Swissky
52b0cd6030
Ligolo Reverse Tunneling
2020-10-08 11:23:12 +02:00
YoavB
dbddc717af
Use cloudflared to expose internal service
2020-10-03 22:34:28 +03:00
ritiksahni
7e0e06682b
Removed broken link
...
bitrot.sh domain is expired and hence the link in the markdown file was broken.
2020-10-03 00:25:36 +05:30
@cnagy
50c12f2e71
Added cURL command for Wayback Machine querying
2020-10-02 15:26:57 +00:00
@cnagy
ec1f89fbe6
Updated Responder link and added InveighZero
2020-10-02 04:39:09 +00:00
Swissky
837d2641b7
Persistence - Scheduled Tasks
2020-09-30 11:46:04 +02:00
Swissky
6c1a6c41aa
Docker - Kernel Module
2020-09-27 13:53:13 +02:00
Swissky
0cee482b32
Merge pull request #239 from zero77/patch-1
...
Update Linux - Persistence.md
2020-09-23 17:30:32 +02:00
Swissky
229502c497
Update Linux - Persistence.md
2020-09-23 17:29:34 +02:00
Swissky
1a0e31a05e
Zero Logon - Restore pwd
2020-09-18 21:21:55 +02:00
Swissky
f4ef56fca0
Mimikatz Zerologon + reset pwd
2020-09-17 14:05:54 +02:00
Swissky
62678c26ce
.NET Zero Logon
2020-09-16 14:31:59 +02:00
Swissky
14586e4d7a
ZeroLogon via Mimikatz
2020-09-16 14:13:40 +02:00
Swissky
e79918bdc2
CVE-2020-1472 Unauthenticated domain controller compromise
2020-09-14 23:06:09 +02:00
Swissky
bcd700c951
AWS API calls that return credentials - kmcquade
2020-09-06 17:11:30 +02:00
zero77
f1d55a132a
Update Linux - Persistence.md
2020-09-02 09:43:25 +00:00
Swissky
cc95f4e386
AD - Forest to Forest compromise
2020-08-18 09:33:38 +02:00
Justin Perdok
f11c45650b
Update Active Directory Attack.md
2020-08-17 13:18:30 +00:00
Justin Perdok
1284715128
Update Active Directory Attack.md
2020-08-17 13:15:33 +00:00
Justin Perdok
6f3f2239fa
GenericWrite and Remote Connection Manager
...
Added content from https://sensepost.com/blog/2020/ace-to-rce/
2020-08-17 13:00:04 +00:00
Swissky
33129f2b4c
Silver Ticket with services list
2020-08-09 19:25:03 +02:00
Swissky
c7e3ea005e
Powershell Remoting
2020-08-09 12:15:56 +02:00
Swissky
767eb04af6
Persistence - Typo
2020-07-21 19:48:57 +02:00
Swissky
ca9326b5fc
Driver Privilege Escalation
2020-07-13 15:00:36 +02:00
Swissky
dd40ddd233
XSS summary subentries + GraphTCP
2020-07-12 14:44:33 +02:00
Artiom Mocrenco
62443a3753
fix typo
2020-07-08 18:01:12 +03:00
Artiom Mocrenco
2d7d6d6eed
Add TLS-PSK OpenSSL reverse shell method
2020-07-08 17:01:38 +03:00
Swissky
5b1a79cb56
Docker device file breakout
2020-07-04 19:00:56 +02:00
Swissky
ecf29c2cbe
Active Directory - Mitigations
2020-06-18 11:55:48 +02:00
Swissky
71ddb449ce
Windows Persistence
2020-06-01 21:37:32 +02:00
Swissky
5323ceb37c
SUDO CVE + Windows Drivers PrivEsc
2020-05-28 11:19:16 +02:00
Swissky
4ca5e71c2f
Bind shell cheatsheet ( Fix #194 )
2020-05-24 14:09:46 +02:00
Swissky
c1731041b5
Misc & Tricks Page + AMSI + Defender
2020-05-16 13:22:55 +02:00
Swissky
eb074393df
Windows Persistence - Binary replacing
2020-05-13 23:07:39 +02:00
Swissky
a65fdbb568
XSW 4 Fix #205
2020-05-12 14:27:25 +02:00
Swissky
e95a4aeac0
MSOL AD Spray
2020-05-11 17:08:03 +02:00
Swissky
3ed2b28e59
Add user /Y + GPO Powerview
2020-05-10 23:16:29 +02:00
Swissky
7f1c150edd
Mimikatz Summary
2020-05-10 16:17:10 +02:00
joker2a
32b83da302
Update Linux - Privilege Escalation.md
...
Add new privesc for (Centos/Redhat)
Writable /etc/sysconfig/network-scripts/
2020-05-04 11:44:24 +02:00
guanicoe
1fc8b57c85
Update Windows - Privilege Escalation.md
...
added Get-Process to list processes
2020-05-03 21:11:01 +00:00
Swissky
5163ef902c
XSS Google Scholar Payload + Skeleton Key Persistence
2020-05-03 16:28:17 +02:00
Swissky
04899355ad
Magic Hashes + SQL fuzz
2020-04-26 21:43:42 +02:00
Th1b4ud
7c8e9ac4ce
Typo
2020-04-22 16:01:49 +02:00
Th1b4ud
14d03b96a1
Linux privesc - SSH Key Predictable PRNG (Authorized_Keys) Process - Summary
2020-04-22 16:00:31 +02:00
Th1b4ud
2e507a2b2f
Linux privesc - SSH Key Predictable PRNG (Authorized_Keys) Process
2020-04-22 15:55:10 +02:00
Th1b4ud
2740600a6b
Alternative TTY method with /usr/bin/script
2020-04-21 19:21:51 +02:00
Swissky
89f906f7a8
Fix issue - C reverse shell
2020-04-21 11:17:39 +02:00
Swissky
af6760ef7a
RoadRecon + JSON None refs
2020-04-17 16:34:51 +02:00
Th1b4ud
29194a8ef1
Add others shell on reverse shell cheatsheet
...
Add others shell on reverse shell cheatsheet
2020-04-13 19:06:01 +02:00
Swissky
6e7af5a267
Docker Registry - Pull/Download
2020-04-04 18:27:41 +02:00
M4x
1d299f55c9
Delete unnecessary escape characters
...
`whoami` has already been wrapped in backquotes. There is no need to user escape characters again
2020-03-29 23:40:39 +08:00
Swissky
be8f32b586
Docker escape and exploit
2020-03-29 16:48:09 +02:00
Swissky
95ab07b45e
CloudTrail disable, GraphQL tool
2020-03-28 12:01:56 +01:00
guenicoe
a3cc577ebd
added cmd on the USOSVC vuln
...
Added `cmd \c C:\Users\nc.exe` as not typing `cmd \c` did not work for me. Might need even more explanation
2020-03-24 20:15:59 +00:00