Monthly Archives: February 2018

Ports scanning using Metasploit

February 27th, 2018 📆 | 5036 Views ⚑

On your penetration testing, finding ports and services is important. In the real world, I exploited some systems by identifying open

crlf-injector: Auto CRLF Injector

February 27th, 2018 📆 | 4264 Views ⚑

Installation pip install requests git clone Usage $ python Use $ python domain_list.ext] crlf_payload] e.g $ python

Revoke-Obfuscation – PowerShell Obfuscation Detection Framework

February 24th, 2018 📆 | 2690 Views ⚑

Revoke-Obfuscation is a PowerShell v3.0+ compatible PowerShell obfuscation detection framework. Authors Daniel Bohannon (@danielhbohannon) Lee Holmes (@Lee_Homes) Research Blog Post: White Paper:

Invoke-Obfuscation – PowerShell Obfuscator

February 24th, 2018 📆 | 5275 Views ⚑

Invoke-Obfuscation is a PowerShell v2.0+ compatible PowerShell command and script obfuscator. Purpose Attackers and commodity malware have started using extremely basic obfuscation techniques to

UACME: Defeating Windows User Account Control

February 23rd, 2018 📆 | 1778 Views ⚑

UACMe Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. System Requirements x86-32/x64 Windows 7/8/8.1/10TH1/10TH2/10RS1/10RS2 (client, some methods, however, works

Back to Top ↑