This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Regex | Source | |
---|---|---|
MSSE-[0-9a-f]{3}-server | Default Cobalt Strike Artifact Kit binaries | |
status_[0-9a-f]{2} | Default psexec_psh | |
postex_ssh_[0-9a-f]{4} | Default SSH beacon | |
msagent_[0-9a-f]{2} | Default SMB beacon | |
postex_[0-9a-f]{4} | Default Post Exploitation job (v4.2+) | |
mojo.5688.8052.183894939787088877[0-9a-f]{2} | jquery-c2.4.2.profile | |
mojo.5688.8052.35780273329370473[0-9a-f]{2} | jquery-c2.4.2.profile | |
wkssvc[0-9a-f]{2} | jquery-c2.4.2.profile | |
ntsvcs[0-9a-f]{2} | trick_ryuk.profile |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
_____ __ __ ___ __ | |
/ ___/__ ___/ / / |/ /__ ___/ /__ | |
/ (_ / _ \/ _ / / /|_/ / _ \/ _ / -_) | |
\___/\___/\_,_/_/_/__/_/\___/\_,_/\__/ | |
\ \/ / _ | / _ \/ _ | / _ \__ __/ /__ | |
\ / __ |/ , _/ __ | / , _/ // / / -_) | |
/_/_/ |_/_/|_/_/ |_| /_/|_|\_,_/_/\__/ | |
Florian Roth - v0.2 May 2019 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
From: http://redteams.net/bookshelf/ | |
Techie | |
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp. | |
Social Engineering: The Art of Human Hacking by Christopher Hadnagy | |
Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam | |
The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick | |
Hacking: The Art of Exploitation by Jon Erickson and Hacking Exposed by Stuart McClure and others. | |
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Fyodor | |
The Shellcoder's Handbook: Discovering and Exploiting Security Holes by several authors |