đź“–
Documentation
Ctrl
K
Copy
Group 1
Red team
xbz0n@sh:~# Blog
xbz0n.sh
Evading detection in memory - Pt 1: Sleep Obfuscation - Foliage
Oblivion
Kharon/Payload_Type/kharon at main · MythicAgents/Kharon
GitHub
Checking for Symantec Account Connectivity Credentials (ACCs) with PrivescCheck
itm4n’s blog
https://c0rnbread.com/creating-mythic-c2-agent-part1/
c0rnbread.com
ArgFuscator
ArgFuscator
DLL hijacking with exported functions. Example: Microsoft Teams
cocomelonc
Technical Case Study: The Tale of Privilege Escalation vs the Unstartable Service
Medium
GitHub - jfmaes/Invoke-DLLClone: Koppeling x Metatwin x LazySign
GitHub
Revisiting COM Hijacking - SpecterOps
SpecterOps
GitHub - rtecCyberSec/BitlockMove: Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking
GitHub
Obfuscating a Mimikatz Downloader to Evade Defender (2024)
Medium
Flangvik
YouTube
c0rnbread blog
c0rnbread blog
Transforming Red Team Ops with Mythic’s Hidden Gems: Browser Scripting - SpecterOps
SpecterOps
LOLAD
Previous
Application mode kiosque
Last updated
1 day ago