-
OneTouch Technologies Ltd
- Bangladesh
-
22:21
(UTC +06:00) - https://muhiminulhasan.com
- @muhiminulhasan
Red Team
Some notes and examples for cobalt strike's functionality
Automation for internal Windows Penetrationtest / AD-Security
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
Tool to audit and attack LAPS environments
SharpSploit is a .NET post-exploitation library written in C#
Windows Local Privilege Escalation Cookbook
Simple (relatively) things allowing you to dig a bit deeper than usual.
Small and highly portable detection tests based on MITRE's ATT&CK.
Documentation and scripts to properly enable Windows event logs.
Nidhogg is an all-in-one simple to use windows kernel rootkit.
BloodyAD is an Active Directory Privilege Escalation Framework
Demonized Shell is an Advanced Tool for persistence in linux.
KQL Queries. Microsoft Defender, Microsoft Sentinel
My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
Kerberos unconstrained delegation abuse toolkit
Another Windows Local Privilege Escalation from Service Account to System
A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes.
Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket
Adaptive DLL hijacking / dynamic export forwarding
Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege
Collection of UAC Bypass Techniques Weaponized as BOFs
Red Team Attack Lab for TTP testing & research