title:"Big-IP®" org:"Organization Name"
http.title:"BIG-IP®- Redirect" org:"Organization Name"
http.favicon.hash:-335242539 "3992" org:"Organization Name"
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
Grab Forest Trusts. | |
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
Note: I did not author this, i found it somehwere.
- Tools
- Most common paths to AD compromise
- [GPO - Pivoting with Local Admin
The following content is generated using a preview release of Swimlane's pyattck.
This snippet of data is scoped to the following actor groups:
- APT33
- APT34
- APT39
- Charming Kitten
Thank you everybody, Your comments makes it better
sh -c "$(curl -fsSL https://raw.github.com/ohmyzsh/ohmyzsh/master/tools/install.sh)"
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
set disassembly-flavor intel | |
set disassemble-next-line on | |
set history save on | |
set print pretty on | |
set pagination off | |
set confirm off | |
define xxd | |
dump binary memory dump.bin $arg0 $arg0+$arg1 |
-
Lost in Translation - A repository of the leaked tools
-
MS17-010 - Port of some of the exploits to Windows 10
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://chrome.google.com/webstore/detail/%D0%B0%D0%B2%D1%82%D0%BE%D1%80%D1%81%D0%BA%D0%B8%D0%B5-%D1%81%D1%82%D0%B8%D0%BA%D0%B5%D1%80%D1%8B-%D0%B1%D0%B5%D1%81%D0%BA%D0%BE%D0%BD%D0%B5/aoaagafllhniocophalnomgfmolofkko | |
https://chrome.google.com/webstore/detail/senscritique/nofmkkmhgjhhhilmilkcamnkbjhpkfen | |
https://chrome.google.com/webstore/detail/wambli-wiconi-tipi-db-sit/caldolanelnbbloogdldjcjcpeidfngc | |
https://chrome.google.com/webstore/detail/piscine-iasi/hgnfahakmadogmfpbmfmnonciegelngl | |
https://chrome.google.com/webstore/detail/chouti-enhance/pdllnllndjpgeklihnlgeloknebkepeb | |
https://chrome.google.com/webstore/detail/ezshopper/bnkdkedkdoaniknfocfonneflokdimcm | |
https://chrome.google.com/webstore/detail/ptysh/kpioedflaimmieepoconfikagbjclojh | |
https://chrome.google.com/webstore/detail/dussenberg-model-j-tab/dcaijaamhndclgifjelncejelokpcpdn | |
https://chrome.google.com/webstore/detail/balance/lflebgnjdhlmnedagbeildjbagfllhie | |
https://chrome.google.com/webstore/detail/mecha-khaxis/iepfbkljfaoegagfeeiklcdcennadiei |
This tutorial is based on the Computerphile video, made by Dr. Mike Pound
https://www.youtube.com/watch?v=1S0aBV-Waeo
The tutorial will show you how to trigger and exploit a buffer overflow attack against a custom C program, using Kali Linux 32-bit PAE 2016.1.
Torrent Link: https://images.offensive-security.com/virtual-images/Kali-Linux-2016.1-vbox-i686.torrent
NewerOlder