w0rk3r's Windows Hacking Library
CommandoVM - a fully customized, Windows-based security distribution for penetration testing and red teaming https://github.com/fireeye/commando-vm @WindowsHackingLibrary
Commando VM: The First of Its Kind Windows Offensive Distribution
https://www.fireeye.com/blog/threat-research/2019/03/commando-vm-windows-offensive-distribution.html
@WindowsHackingLibrary
https://www.fireeye.com/blog/threat-research/2019/03/commando-vm-windows-offensive-distribution.html
@WindowsHackingLibrary
Google Cloud Blog
Commando VM: The First of Its Kind Windows Offensive Distribution | Mandiant | Google Cloud Blog
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by that GPO.
https://github.com/mwrlabs/SharpGPOAbuse
@WindowsHackingLibrary
https://github.com/mwrlabs/SharpGPOAbuse
@WindowsHackingLibrary
GitHub
GitHub - FSecureLABS/SharpGPOAbuse: SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's…
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are contr...
An SMB Relay Race – How To Exploit LLMNR and SMB Message Signing for Fun and Profit
https://www.blackhillsinfosec.com/an-smb-relay-race-how-to-exploit-llmnr-and-smb-message-signing-for-fun-and-profit
@WindowsHackingLibrary
https://www.blackhillsinfosec.com/an-smb-relay-race-how-to-exploit-llmnr-and-smb-message-signing-for-fun-and-profit
@WindowsHackingLibrary
Black Hills Information Security
An SMB Relay Race - How To Exploit LLMNR and SMB Message Signing for Fun and Profit - Black Hills Information Security
Jordan Drysdale// This is basically a slight update and rip off of Marcello’s work out here: https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html /tl;dr – Zero to DA on an environment through…
Finding Weaknesses Before the Attackers Do
https://www.fireeye.com/blog/threat-research/2019/04/finding-weaknesses-before-the-attackers-do.html
@WindowsHackingLibrary
https://www.fireeye.com/blog/threat-research/2019/04/finding-weaknesses-before-the-attackers-do.html
@WindowsHackingLibrary
The Death Metal Suite
https://www.coalfire.com/The-Coalfire-Blog/April-2019/The-Death-Metal-Suite
@WindowsHackingLibrary
https://www.coalfire.com/The-Coalfire-Blog/April-2019/The-Death-Metal-Suite
@WindowsHackingLibrary
Coalfire
The Death Metal Suite
Death Metal is a toolkit designed to exploit AMT’s legitimate features, as the AMT framework’s functionality, designed for innocent system administration…
Bypassing AD account lockout for a compromised account
https://medium.com/@markmotig/bypassing-ad-account-lockout-for-a-compromised-account-5c908d663de8
@WindowsHackingLibrary
https://medium.com/@markmotig/bypassing-ad-account-lockout-for-a-compromised-account-5c908d663de8
@WindowsHackingLibrary
Medium
Bypassing AD account lockout for a compromised account
This is for educational purposes only. Never do security testing on a machine you do not own or have permission to test on. If you don’t…
HostRecon: A Situational Awareness Tool
https://www.blackhillsinfosec.com/hostrecon-situational-awareness-tool
@WindowsHackingLibrary
https://www.blackhillsinfosec.com/hostrecon-situational-awareness-tool
@WindowsHackingLibrary
Black Hills Information Security, Inc.
HostRecon: A Situational Awareness Tool - Black Hills Information Security, Inc.
Beau Bullock // Overview HostRecon is a tool I wrote in PowerShell to assist with quickly enumerating a number of items that I would typically check after gaining access to […]
Syncing Into the Shadows
https://jsecurity101.com/2019/Syncing-into-the-Shadows
@WindowsHackingLibrary
https://jsecurity101.com/2019/Syncing-into-the-Shadows
@WindowsHackingLibrary
Combining NTLM Relaying and Kerberos delegation
https://chryzsh.github.io/relaying-delegation
@WindowsHackingLibrary
https://chryzsh.github.io/relaying-delegation
@WindowsHackingLibrary
Antimalware Scan Interface (AMSI) — A Red Team Analysis on Evasion
https://iwantmore.pizza/posts/amsi.html
@WindowsHackingLibrary
https://iwantmore.pizza/posts/amsi.html
@WindowsHackingLibrary
Windows Exploitation Tricks: Abusing the User-Mode Debugger
https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html
@WindowsHackingLibrary
https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html
@WindowsHackingLibrary
Blogspot
Windows Exploitation Tricks: Abusing the User-Mode Debugger
Posted by James Forshaw, Google Project Zero I've recently been adding native user-mode debugger support to NtObjectManager . Whenever ...
Purple Team ATT&CK™ Automation
https://github.com/praetorian-inc/purple-team-attack-automation
@WindowsHackingLibrary
https://github.com/praetorian-inc/purple-team-attack-automation
@WindowsHackingLibrary
GitHub
GitHub - praetorian-inc/purple-team-attack-automation: Praetorian's public release of our Metasploit automation of MITRE ATT&CK™…
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs - praetorian-inc/purple-team-attack-automation
Lateral Movement — SCM and Dll Hijacking Primer
https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
@WindowsHackingLibrary
https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
@WindowsHackingLibrary
Posts By SpecterOps Team Members
Lateral Movement — SCM and Dll Hijacking Primer
Using the Service Control Manager and built-in services for lateral movement.
Under-the-hood: WMImplant Invoking PowerShell
https://www.fortynorthsecurity.com/under-the-hood-wmimplant-invoking-powershell
@WindowsHackingLibrary
https://www.fortynorthsecurity.com/under-the-hood-wmimplant-invoking-powershell
@WindowsHackingLibrary
FortyNorth Security Blog
Under-the-hood: WMImplant Invoking PowerShell
WMImplant is a powerful PowerShell based tool that enables its users to conduct nearly any post-exploitation action and exclusively using WMI to do so. We’ve blogged about out-of-the-box detection opportunities for WMImplant, how to copy files, searching…