Plus récents

ObjectWalker v2.1.6 by Rémi Gascou

module to explore the object tree to extract paths to interesting targets / objects in memory

github.com/p0dalirius/objectwa

몾 Artemis a partagé

✨️ New p0wny@shell release!

➡️ github.com/flozz/p0wny-shell

It now tries different execution functions (exec, shell_exec, system, passthru, popen, proc_open) to run commands to bypass disabled functions! 😎️

  • Process_String_Extractor.ps1

This scriplet is also able to extract Cookies for Microsoft O365 / Microsoft Azure PTC Attack

gist.github.com/LuemmelSec/3f2

L'extrait audio contient des injures 

@LilianPCB @Christ_OFF@diaspodon.fr @Deidre Livre commandé. Connaissez-vous 🇯🇵 Yoshiaki Kawajiri & Akinori Endo 📽️ ​​Cyber City Oedo 808 (1990) ?

(2808) Trois cybercriminels lourdement condamnés sont emprisonnées au pénitencier orbital de haute sécurité. Ces condamnés à mort se voient proposer une suspension d'incarcération avec de possibles réductions de peines en échange de collaborations avec la Cyber Police pour faire le sal boulot.

​​LOLDrivers

Living Off The Land Drivers is a curated list of Microsoft Windows drivers used by adversaries

loldrivers.io

The game of chess is like a sword fight. You must think first, before you move.

hem-hashes

HIEW module to calc MD5, SHA-1 & SHA-256 hashes of a given file/block

github.com/merces/hem-hashes

Hunt-Weird-Syscalls

This project uses kernel based ETW providers to monitor for IOCs

github.com/thefLink/Hunt-Weird

ScareCrow v5.0.0

Payload creation framework designed around EDR bypass

github.com/optiv/ScareCrow

Plus anciens
nanao

Comme le soleil, les machines ne se couchent jamais.