Hacking Windows: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
(Created page with "Find common vulnerabilities and misconfigurations in a windows environment to escalate your privileges: [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS winPEAS] * Living Off The Land Binaries, Scripts and Libraries: https://lolbas-project.github.io * Living off the land. Evading detection with Sysinternals: https://live.sysinternals.com (\\live.sysinternals.com\tools) * mimikatz: https://github.com/gentilkiwi/mimikatz/releases * https://github.com/fortra...")
 
mNo edit summary
 
Line 27: Line 27:
* https://amsi.fail
* https://amsi.fail
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20AMSI%20Bypass.md https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology and Resources/Windows - AMSI Bypass.md]
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20AMSI%20Bypass.md https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology and Resources/Windows - AMSI Bypass.md]
== Persistence ==
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Persistence.md Windows - Persistence]

Latest revision as of 15:49, 8 October 2023

Find common vulnerabilities and misconfigurations in a windows environment to escalate your privileges: winPEAS

Active Directory

Active Directory General Tools & resources you may find useful for learning.

See Active Directory for learning resources and tools.

Antivirus & EDR Evasion

Persistence