Advanced Search
Search Results
61 total results found
Articles
Protected Users Group This is for when you are RESTRICTED or otherwise unable to do things due to being in the Protected Users group. Attacking Not-So-Protected User Sessions | Medium
Articles
TrustedSec | I’m bringing relaying back: A comprehensive guide on… Relay | The Hacker Recipes
Relay Diagram
Thanks Relay | The Hacker Recipes
Persistence Resources
These are things I want to research further: https://pentestlab.blog/2020/01/21/persistence-wmi-event-subscription/ https://learn.microsoft.com/en-us/windows/win32/wmisdk/managed-object-format--mof- https://attack.mitre.org/techniques/T1218/010/ https://...
ATP records, studies, etc.
VX Underground vx-underground.org
.NET Version
If you are trying to detonate in an environment using PowerShell <5 (Most companies are only going to be using standard powershell) you MUST make sure that the output/resulting binary targets a lower/longlife version of .NET. For instance, net48/net4.0. If y...
References
https://learn.microsoft.com/en-us/windows/win32/com/component-object-model--com--portal https://en.wikipedia.org/wiki/Component_Object_Model https://learn.microsoft.com/en-us/windows/win32/com/com-fundamentals https://learn.microsoft.com/en-us/dotnet/csha...
CHM
Creating a CHM can be done using the Free Pascal Compiler or Ide on Linux sudo apt-get install fp-ide sudo apt-get install fp-compiler The CHM can be compiled using the installed 'chmcmd' program. Guide Thanks, Copilot: 📁 Step-by-Step Guide Make Conte...