| Pretraživanje | Osvježi |
|
Pralhad Chaskar
@c0d3xpl0it
|
14. velj 2017. |
|
Compromising Domain Admin in Internal Pentest goo.gl/7NnxBX #Bloodhound #Powersploit #Pentest #LazyKatz #Powershell
|
||
|
|
||
|
secabstraction
@secabstraction
|
19. sij 2016. |
|
My write-up on logging keys with PowerShell. patch-tuesday.net/2016/01/script… #PowerSploit
|
||
|
|
||
|
__mat__
@matthieu_faou
|
29. svi |
|
We analyzed a new cluster of PowerShell loaders used by #Turla to execute various custom malware into-memory only. The loader is based on the Penetration testing framework #PowerSploit. Payloads include a RPC backdoor and a PowerShell backdoor abusing OneDrive as C&C server. twitter.com/welivesecurity… pic.twitter.com/m0Sq31J0qJ
|
||
|
||
|
OccupytheWeb
@three_cube
|
27. lis 2018. |
|
How to Control Nearly any Windows Computer with Powersploit #powersploit #windows #cybersecurity #infosec bit.ly/2oJP9xC pic.twitter.com/AAWJa8owJX
|
||
|
||
|
Florian Roth
@cyb3rops
|
14. lip 2016. |
|
|
||
|
|
||
|
Chris Campbell
@obscuresec
|
20. svi 2014. |
|
If you were having problems with Invoke-Mimikatz post-patch, @JosephBialek updated it! #PowerSploit github.com/mattifestation… Please Update.
|
||
|
|
||
|
Tal Be'ery
@TalBeerySec
|
15. ruj 2016. |
|
2/ On Anniversary update, it's disabled by default for non-privileged users. implications: #PowerSploit's Get-NetLocalGroup no longer works
|
||
|
|
||
|
Oddvar Moe
@Oddvarmoe
|
20. pro 2016. |
|
It sure feels good to have contributed a little, to such a kick ass project! github.com/PowerShellMafi… #PowerSploit
|
||
|
|
||
|
Chris Campbell
@obscuresec
|
12. pro 2012. |
|
Using PowerShell to find AV signatures $BlogPost = obscuresecurity.blogspot.com/2012/12/findin… #PowerSploit
|
||
|
|
||
|
Profero
@ProferoSec
|
10. kol |
|
Created a very simple yet efficient @yararules to detect #PowerSploit's @stephenfewer Reflective DLL Injection module. You can try it out here: github.com/proferosec/Thr…
|
||
|
|
||
|
Chris Campbell
@obscuresec
|
26. tra 2015. |
|
Invoke-Shellcode is fixed with a couple other updates. Thank you @enigma0x3 and @harmj0y #PowerSploit github.com/mattifestation…
|
||
|
|
||
|
OccupytheWeb
@three_cube
|
18. ruj 2017. |
|
Taking Control of Anyone's Windows System with Powersploit #powersploit #cybersecurity #powershell
bit.ly/2oJP9xC pic.twitter.com/Dz3dRyz07L
|
||
|
||
|
Odisseus
@_odisseus
|
7. lip 2017. |
|
Using #metasploit and #powersploit in a step by step hacking tutorial on the Metasploitable 3 virtual machine. zero-day.io/metasploitwalk… pic.twitter.com/WWoswjS6hp
|
||
|
||
|
Null Bangalore
@Nullblr
|
1. lip 2018. |
|
Announcing "Post Exploitation with PowerSploit (Getting started)" by @riyazwalikar
Reg open: 1st June 2018 10:00 PM
Reg close: 4th June 2018 7:00 PM
null.co.in/events/455-ban…
#nullBlr #nullhumla #powersploit
|
||
|
|
||
|
Jake Mowrer
@JakeMowrerMSFT
|
10. svi 2017. |
|
A Powershell command resulting in Rickroll via ASCII, possibly the best thing I've ever seen LOL. #Powersploit @mattifestation
|
||
|
|
||
|
Rebecca Deck
@ranger_cha
|
25. svi 2016. |
|
Is anyone else amazed and terrified when Get-GPPPassword still works? #infosec #powersploit pic.twitter.com/lMHtAbNlw2
|
||
|
|
||
|
🥝 Benjamin Delpy
@gentilkiwi
|
8. pro 2016. |
|
For Invoke-Mimikatz in "recent" version use /dev of #powersploit
You only need to past #mimikatz compiled DLL into! github.com/PowerShellMafi… pic.twitter.com/KXrIvb5kmU
|
||
|
||
|
netbiosX
@netbiosX
|
18. ruj 2013. |
|
#PowerSploit: The Easiest Shell You’ll Ever Get pentestgeek.com/2013/09/18/inv…
|
||
|
|
||
|
🅸🅽🅵🅾🆂🅴🅲🅵🅰🅼🥳🥂 2️⃣ 0️⃣ 2️⃣ 0️⃣ 🎉🍾
@InfosecFam
|
14. pro 2018. |
|
Gotta dive into #PowerSploit. Never played with it much, but I hear its "powerful" (no pun intended 😁). I'm especially interested in the DLL injection module. #PowerShell #DFIR #CyberSecurity #Malware twitter.com/three_cube/sta…
|
||
|
|
||
|
IntellectFaces
@intellectfaces
|
13. pro 2018. |
|
Top 8 Penetration Testing Tools to Use. [Infographic] #penetrationtesting #pen #testing #RPA #Nmap #BurbSuite #PowerSploit pic.twitter.com/OdqBr3IGgR
|
||
|
||