Explore tweets tagged as #PostExploitation
@podalirius_
Rémi GASCOU (Podalirius)
2 years
I wrote a new tool to extract all the Bitlocker recovery keys of computers enrolled in a Windows domain 🥳 This is really useful in postexploitation or system administration (to backup keys for example). Export in XLSX, SQLITE, JSON https://t.co/Srd5FErWrZ Here is an example:
2
103
292
@reveng007
Soumyani1
2 years
Introducing DarkWidow (Dropper/PostExploitation Toolkit): Capabilities: 1. Indirect Dynamic Syscall 2. SSN + Syscall address sorting via Modified TartarusGate approach (Other capabilities are in the comments...) https://t.co/7hfk9U5D9h
10
64
192
@707_Roi
Rwotolara Innocent
2 months
Started working through Intro to Shells on @RealTryHackMe! Understood the difference between reverse and bind shells and how to set them up. Persistence in hacking is fascinating! 🔗 #ReverseShells #PostExploitation #EthicalHacking
0
0
4
@blueteamsec1
Blue Team News
2 years
WindowSpy - A Cobalt Strike Beacon Object File Meant For Targetted User Surveillance #PostExploitation #Windows #WindowSpy https://t.co/MHv2fWWK1i
3
80
199
@_aircorridor
Olexander
2 years
Day #10 of reading "Getting started becoming a master hacker" Chapter 11 - Post Exploitation *Post-Exploitation Modules *Exploitation in Windows 7 *Mimikatz *Post Exploitation of MySQL #occupytheweb #infosec #cybersecurity #postexploitation #learning
0
3
15
@Anastasis_King
Anastasis Vasileiadis (Cyberkid)
6 months
Sapphire Ticket Attack: Understanding Kerberos Ticket Forgery Risks 💎🎟️🛡️ #Kerberos #SapphireTicket #ActiveDirectory #CyberSecurity #EthicalHacking #RedTeam #InfoSec #EducationOnly #PostExploitation #WindowsSecurity
0
0
1
@FornsecS
FORnSEC Solutionsᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠᅠ
19 days
0
0
0
@Anastasis_King
Anastasis Vasileiadis (Cyberkid)
5 months
3
1
1
@hack_git
HackGit
2 years
DarkWidow This is a Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows. https://t.co/A4ZHSuVdlz #infosec #pentesting #redteam
0
16
48
@Anastasis_King
Anastasis Vasileiadis (Cyberkid)
4 months
1
0
1
@Anastasis_King
Anastasis Vasileiadis (Cyberkid)
4 months
1
0
1
@Anastasis_King
Anastasis Vasileiadis (Cyberkid)
5 months
0
0
0
@Anastasis_King
Anastasis Vasileiadis (Cyberkid)
6 months
0
0
0
@Anastasis_King
Anastasis Vasileiadis (Cyberkid)
4 months
2
0
0
@Anastasis_King
Anastasis Vasileiadis (Cyberkid)
4 months
🛡️ MSSQL for Pentesters: Using Netexec for SQL Server Attacks & Enumeration 🧪🎯 #MSSQLPentesting #Netexec #SQLServerSecurity #RedTeamLabs #EthicalHacking #CyberSecurityTraining #InfoSec #PostExploitation #EducationOnly #PenetrationTesting
2
0
1
@studentofthings
Student Of Things
2 years
Not everyone is working on Saturdays to change the game in Cyber Security, but some are… #postexploitation #mythic #protection #redteam
0
0
0
@ethiqueeettac
Éthique et tac
8 months
Les mines abandonnées des kangourous #SurveillanceMinière #ResponsabilitéEnvironnementale #CoûtContribuable #ExploitationMinière #Environnement #Finance #PostExploitation #MinesAbandonnées #DéveloppementDurable #Economie
0
0
0
@Hadess_security
HADESS
1 year
Art of Post-Exploitation 📝 Article: https://t.co/XUMJR2Pl7J 📚 EBook: https://t.co/K4V50XIpFM 👑 Security Researchers: Fazel Mohammad Ali Pour(@ArganexEmad) #postexploitation #exploit #execution #privilegeescalation #exfiltrate
1
27
77