#PostExploitation
Explore tagged Tumblr posts
Text
EternalHushFramework: Advanced C&C Framework | #CommandControl #Framework #Postexploitation #Hacking
0 notes
Link

#reverse shell#RedTeaming#C2#PostExploitation#payloads#CobaltStrike#MITRE#ATT&CK#exploit#pentester#C2Framework#ProcessInjection#AVbypass#RAT
3 notes
·
View notes
Text
Emp3R0R - Linux Post-Exploitation Framework Made By Linux User
Emp3R0R - Linux Post-Exploitation Framework Made By Linux User #CloudFlare #Emp3R0R #Framework #linux #Malware #MITM
linux post-exploitation framework made by linux user Still under active development 中文介绍 check my blog for updates how to use what to expect (in future releases) packer: cryptor + memfd_create packer: use shm_open in older Linux kernels dropper: shellcode injector – python injector: inject shellcode into another process, using GDB port mapping: forward from CC to agents, so you can use…
View On WordPress
#CloudFlare#Emp3R0R#Framework#linux#Malware#MITM#Post-Exploitation#PostExploitation#Redteam#Redteaming#Remote Administration#Rootkit#Trojan Malware#User
1 note
·
View note
Text
[Media] meterpeter
meterpeter C2 Powershell Command & Control Framework with BuiltIn Commands (Modules) This PS1 starts a listener Server on a Windows|Linux attacker machine and generates oneliner PS reverse shell payloads obfuscated in BXOR with a random secret key and another layer of Characters/Variables Obfuscation to be executed on the victim machine (The payload will also execute AMSI reflection bypass in current session to evade AMSI detection while working). You can also recive the generated oneliner reverse shell connection via netcat. (in this case you will lose the C2 functionalities like screenshot, upload, download files, Keylogger, AdvInfo, PostExploit, etc) meterpeter payloads/droppers can be executed using User or Administrator Privileges depending of the cenario (executing the Client as Administrator will unlock ALL Server Modules, amsi bypasses, etc.). Droppers mimic a fake KB Security Update while in background download\exec Client in '$Env:TMP' trusted location, with the intent of evading Windows Defender Exploit Guard. meterpeter payloads|droppers are FUD (please dont test samples on VirusTotal). Under Linux users required to install powershell and apache2 webserver, Under Windows its optional the install of python3 http.server to deliver payloads under LAN networks. If this requirements are NOT met, then the Client ( Update-KB4524147.ps1 ) will be written in meterpeter working directory for manual deliver. https://github.com/r00t-3xp10it/meterpeter

0 notes
Photo
PowerSploit – A PowerShell Post-Exploitation Framework | MrHacker.Co #framework #postexploitation #powershell #powersploit #hacker #hacking #cybersecurity #hackers #linux #ethicalhacking #programming #security #mrhacker
0 notes
Text
Introducing SharpSploit A C PostExploitation Library
SNNX.com : Introducing SharpSploit A C PostExploitation Library http://dlvr.it/Qkwg6r
0 notes
Text
Backdoor Factory
The goal of BDF is patch executable binaries with user desidered shellcode and continue normal execution of the prepatched state. (more…)
View On WordPress
0 notes
Text
CryptCat - Netcat + Encryption
CryptCat – Netcat + Encryption
CryptCatis a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of…
View On WordPress
0 notes
Link

#threat detection#OffensiveSecurity#RedTeam#BlueTeam#OSINT#AttackSurface#Phishing#PostExploitation#Exploit#ThreatDetection
1 note
·
View note
Link
#vulnerability#CobaltStrike#C2#Malware#Payload#Exploit#VAPT#PostExploitation#shellcode#Cyber#Hacking#APT#Infosec#Appsec#Pentest#Security
0 notes
Link
#vulnerability#Payloads#OffensiveSecurity#ReverseEngineering#PostExploitation#CVEs#OSCP#RedTeam#Hacking#Bugbounty#VAPT#Pentesting#Infosec#Appsec#OSCE#Malware#Exploit
0 notes
Link
#xxe#CVE-2022-29072#PrivilegeEscalation#Windows#7z#Exploit#vulnerability#payload#CVE#DOS#PostExploitation#Hacking#Malware#Bugbounty
0 notes
Link
#windows#RedTeam#LateralMovement#Mimikatz#Enumeration#Portscan#Powershell#PostExploitation#Hacking#VAPT#kerberos#Bruteforce#ADAttacks#InformationGathering
0 notes
Link
0 notes
Link
0 notes
Link
0 notes