unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Process Herpaderping (Mitre:T1055)
IntroductionJohnny Shaw demonstrated a defense evasion technique known as process herpaderp...
2022-4-25 01:40:13 | 阅读: 45 |
收藏
|
www.hackingarticles.in
payload
mapped
inspection
injection
A Detailed Guide on Hydra
Hello! Pentesters, this article is about a brute-forcing tool Hydra. Hydra is one of the favourite...
2022-4-23 02:30:28 | 阅读: 166 |
收藏
|
www.hackingarticles.in
hydra
username
proxy
ignite
passwords
A Detailed Guide on HTML Smuggling
IntroductionHTML Smuggling is an evasive payload delivery method that helps an attacker smuggle pa...
2022-4-20 02:3:28 | 阅读: 38 |
收藏
|
www.hackingarticles.in
payload
download
victim
blobs
anchor
A Detailed Guide on Medusa
Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, paralle...
2022-4-16 02:7:0 | 阅读: 35 |
收藏
|
www.hackingarticles.in
medusa
username
ignite
logins
Process Doppelganging (Mitre:T1055.013)
IntroductionEugene Kogan and Tal Liberman presented a technique for defense evasion called...
2022-4-15 01:43:9 | 阅读: 26 |
收藏
|
www.hackingarticles.in
memory
windows
payload
dummy
Process Hollowing (Mitre:T1055.012)
IntroductionIn July 2011, John Leitch of autosectools.com talked about a technique he called proce...
2022-4-13 02:5:5 | 阅读: 22 |
收藏
|
www.hackingarticles.in
memory
hollowing
suspended
ppeb
Defense Evasion: Process Hollowing (Mitre:T1055.012)
IntroductionIn July 2011, John Leitch of autosectools.com talked about a technique he called proce...
2022-4-13 02:5:5 | 阅读: 41 |
收藏
|
www.hackingarticles.in
memory
hollowing
suspended
A Detailed Guide on AMSI Bypass
IntroductionWindows developed the Antimalware Scan Interface (AMSI) standard that allows a develop...
2022-4-12 04:27:32 | 阅读: 81 |
收藏
|
www.hackingarticles.in
bypass
powershell
mimikatz
memory
windows
A Detailed Guide on Responder (LLMNR Poisoning)
IntroductionResponder is a widely used tool in penetration test scenarios and can be used for late...
2022-4-10 00:57:55 | 阅读: 180 |
收藏
|
www.hackingarticles.in
responder
llmnr
victim
dhcp
wpad
A Detailed Guide on Cewl
Hi, Pentesters! In this article, we are going to focus on the Kali Linux tool “Cewl” which will bas...
2022-4-8 01:50:31 | 阅读: 55 |
收藏
|
www.hackingarticles.in
cewl
proxy
vulnweb
lowercase
Windows Persistence: COM Hijacking (MITRE: T1546.015)
IntroductionAccording to MITRE, “Adversaries can use the COM system to insert malicious code that...
2022-4-6 17:30:11 | 阅读: 37 |
收藏
|
www.hackingarticles.in
clsid
software
microsoft
machine
Lateral Movement: Remote Services (Mitre:T1021)
IntroductionDuring Red Team assessments, after a compromise has been done, attackers tend to later...
2022-3-28 00:29:50 | 阅读: 55 |
收藏
|
www.hackingarticles.in
remote
lateral
windows
t1021
powershell
Lateral Movement: WebClient Workstation Takeover
IntroductionThe article is based on @tifkin_’s idea that a workstation takeover, also known as lat...
2022-3-25 01:42:9 | 阅读: 42 |
收藏
|
www.hackingarticles.in
responder
webdav
petitpotam
machine
delegation
A Detailed Guide on Crunch
IntroductionOften times attackers have the need to generate a wordlist based on certain criteria w...
2022-3-24 02:26:47 | 阅读: 36 |
收藏
|
www.hackingarticles.in
crunch
lowercase
alphabets
raj
Parent PID Spoofing (Mitre:T1134)
IntroductionParent PID spoofing is an access token manipulation technique that may aid an attacker...
2022-3-20 02:34:57 | 阅读: 49 |
收藏
|
www.hackingarticles.in
spoofing
powershell
windows
reverse
msfvenom
Indirect Command Execution: Defense Evasion (T1202)
IntroductionIndirect Command Execution is a defense evasion technique that is often used by Red Te...
2022-3-18 02:5:2 | 阅读: 43 |
收藏
|
www.hackingarticles.in
windows
reverse
victim
4444
processes
A Detailed Guide on httpx
Introductionhttpx is a fast web application reconnaissance tool coded in go by www.projectidscover...
2022-3-15 02:43:28 | 阅读: 99 |
收藏
|
www.hackingarticles.in
httpx
vulnweb
testphp
webpage
probes
Domain Escalation: Resource Based Constrained Delegation
IntroductionDelegation has been a part of Microsoft’s Active Directory environment since the early...
2022-3-13 02:9:30 | 阅读: 102 |
收藏
|
www.hackingarticles.in
delegation
constrained
ignite
dc1
noob
Linux Privilege Escalation: DirtyPipe (CVE 2022-0847)
IntroductionCVE 2022-0847 is a privilege escalation vulnerability discovered by Max Kellerman pres...
2022-3-10 01:54:1 | 阅读: 95 |
收藏
|
www.hackingarticles.in
splice
traitor
crc
0847
fd1
A Detailed Guide on Wfuzz
IntroductionMany tools have been developed that create an HTTP request and allow a user to modify...
2022-3-6 02:16:26 | 阅读: 138 |
收藏
|
www.hackingarticles.in
wfuzz
testphp
vulnweb
payload
php
Previous
5
6
7
8
9
10
11
12
Next