<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Amongomous</id>
	<title>Enlace Hacktivista - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://enlacehacktivista.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Amongomous"/>
	<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php/Special:Contributions/Amongomous"/>
	<updated>2026-04-22T19:16:19Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Roskomnadzor&amp;diff=381</id>
		<title>Roskomnadzor</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Roskomnadzor&amp;diff=381"/>
		<updated>2022-03-12T13:35:46Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of over 360,000 files or 820GB of data from the Russian Federal Service for Supervision of Communications, Information Technology and Mass Media, commonly known as Roskomnadzor - the government agency responsible for monitoring, controlling and censoring Russian mass media and the internet.&lt;br /&gt;
&lt;br /&gt;
https://ddosecrets.com/wiki/Roskomnadzor&lt;br /&gt;
&lt;br /&gt;
The hacker who identified themselves only as being part of the hacktivist collective Anonymous stated that they urgently felt the Russian people should have access to information about their government&#039;s involvement in the Russo-Ukrainian War. They also expressed their opposition to the Russian people being cut off from independent media and the outside world.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://www.vice.com/en/article/xgdmj7/russian-censorship-roskomnadzor-hacked-leak-distributed-denial-of-secrets&lt;br /&gt;
* https://torrentfreak.com/anonymous-hacks-russias-roscomnadzor-site-blocking-agency-220311/&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=380</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=380"/>
		<updated>2022-03-12T13:23:39Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* 2022 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;br /&gt;
* [[Pronico]]&lt;br /&gt;
* [[Roskomnadzor]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Roskomnadzor&amp;diff=379</id>
		<title>Roskomnadzor</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Roskomnadzor&amp;diff=379"/>
		<updated>2022-03-12T13:22:28Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: Created page with &amp;quot;Hack of over 360,000 files or 820GB of data from the Russian Federal Service for Supervision of Communications, Information Technology and Mass Media, commonly known as Roskomnadzor - the government agency responsible for monitoring, controlling and censoring Russian mass media.  https://ddosecrets.com/wiki/Roskomnadzor  The hacker who identified themselves only as being part of the hacktivist collective Anonymous stated that they urgently felt the Russian people should...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of over 360,000 files or 820GB of data from the Russian Federal Service for Supervision of Communications, Information Technology and Mass Media, commonly known as Roskomnadzor - the government agency responsible for monitoring, controlling and censoring Russian mass media.&lt;br /&gt;
&lt;br /&gt;
https://ddosecrets.com/wiki/Roskomnadzor&lt;br /&gt;
&lt;br /&gt;
The hacker who identified themselves only as being part of the hacktivist collective Anonymous stated that they urgently felt the Russian people should have access to information about their government&#039;s involvement in the Russo-Ukrainian War. They also expressed their opposition to the Russian people being cut off from independent media and the outside world.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://www.vice.com/en/article/xgdmj7/russian-censorship-roskomnadzor-hacked-leak-distributed-denial-of-secrets&lt;br /&gt;
* https://torrentfreak.com/anonymous-hacks-russias-roscomnadzor-site-blocking-agency-220311/&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=AgainstTheWest&amp;diff=378</id>
		<title>AgainstTheWest</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=AgainstTheWest&amp;diff=378"/>
		<updated>2022-03-12T12:44:38Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: Created page with &amp;quot;AgainstTheWest was a NATO-based hacktivist collective originating from RaidForums that focused on leaking source code and other intellectual property from countries that were &amp;quot;against the west.&amp;quot;  Pascal, also known as BlueHornet (the leader of the group) passed away from natural causes in March 2022.  https://backchannel.substack.com/p/againstthewest-the-hacking-group  Category:Hackers&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AgainstTheWest was a NATO-based hacktivist collective originating from RaidForums that focused on leaking source code and other intellectual property from countries that were &amp;quot;against the west.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Pascal, also known as BlueHornet (the leader of the group) passed away from natural causes in March 2022.&lt;br /&gt;
&lt;br /&gt;
https://backchannel.substack.com/p/againstthewest-the-hacking-group&lt;br /&gt;
&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=363</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=363"/>
		<updated>2022-03-07T15:13:55Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* https://github.com/blacklanternsecurity/MANSPIDER&lt;br /&gt;
* https://github.com/login-securite/DonPAPI&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* AAD Connect Cloud Sync: as local admin impersonate or retrieve managed password of the provagentgMSA account to dcsync.&lt;br /&gt;
** see: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md#reading-gmsa-password&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
* https://www.inversecos.com/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Microsoft Exchange ==&lt;br /&gt;
&lt;br /&gt;
ProxyLogon is dead. It&#039;s mitigated by Defender. ProxyShell is not. AMSI catches unmodified public exploits.&lt;br /&gt;
&lt;br /&gt;
* ProxyShell:  https://github.com/dmaasland/proxyshell-poc&lt;br /&gt;
* ProxyShell (webshell via New-MailboxExportRequest): https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/windows/http/exchange_proxyshell_rce.md&lt;br /&gt;
* ProxyShell (webshell via New-ExchangeCertificate): https://gist.github.com/dmaasland/0720891aaf6dec8d3b42a5b92c8d6f94&lt;br /&gt;
* Polymorphic webshells: https://github.com/grCod/poly&lt;br /&gt;
* ProxyShell (no webshell, dump mailboxes via PowerShell): https://github.com/Jumbo-WJB/Exchange_SSRF&lt;br /&gt;
* Export all mailboxes: &amp;lt;code&amp;gt;foreach ($mbx in (Get-Mailbox)){New-MailboxExportRequest -mailbox $mbx.alias -FilePath &amp;quot;\\127.0.0.1\C$\Folder\$($mbx.Alias).pst&amp;quot;}&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=360</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=360"/>
		<updated>2022-03-04T16:04:40Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Office 365 &amp;amp; Azure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* https://github.com/blacklanternsecurity/MANSPIDER&lt;br /&gt;
* https://github.com/login-securite/DonPAPI&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* AAD Connect Cloud Sync: as local admin impersonate or retrieve managed password of the provagentgMSA account to dcsync.&lt;br /&gt;
** see: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md#reading-gmsa-password&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
* https://www.inversecos.com/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=359</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=359"/>
		<updated>2022-02-23T19:35:53Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Office 365 &amp;amp; Azure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* https://github.com/blacklanternsecurity/MANSPIDER&lt;br /&gt;
* https://github.com/login-securite/DonPAPI&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* AAD Connect Cloud Sync: as local admin impersonate or retrieve managed password of the provagentgMSA account to dcsync.&lt;br /&gt;
** see: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md#reading-gmsa-password&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=350</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=350"/>
		<updated>2022-02-12T14:13:31Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* https://github.com/blacklanternsecurity/MANSPIDER&lt;br /&gt;
* https://github.com/login-securite/DonPAPI&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=349</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=349"/>
		<updated>2022-02-12T06:54:44Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Tools */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* https://github.com/blacklanternsecurity/MANSPIDER&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://gist.github.com/xpn/f12b145dba16c2eebdd1c6829267b90c#file-azuread_decrypt_msol_v2-ps1&lt;br /&gt;
* https://github.com/login-securite/DonPAPI&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=348</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=348"/>
		<updated>2022-02-08T22:14:00Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Phishing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* https://github.com/blacklanternsecurity/MANSPIDER&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://gist.github.com/xpn/f12b145dba16c2eebdd1c6829267b90c#file-azuread_decrypt_msol_v2-ps1&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=347</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=347"/>
		<updated>2022-02-08T04:29:51Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Office 365 &amp;amp; Azure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* https://github.com/blacklanternsecurity/MANSPIDER&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://gist.github.com/xpn/f12b145dba16c2eebdd1c6829267b90c#file-azuread_decrypt_msol_v2-ps1&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=346</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=346"/>
		<updated>2022-02-03T19:20:50Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* https://github.com/blacklanternsecurity/MANSPIDER&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
* https://github.com/blacklanternsecurity/TREVORspray&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Twitch&amp;diff=345</id>
		<title>Twitch</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Twitch&amp;diff=345"/>
		<updated>2022-01-29T02:45:57Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Media Coverage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of source code and financial information from the Amazon-owned video game livestreaming platform Twitch.&lt;br /&gt;
&lt;br /&gt;
While little is known about the hacker&#039;s motives, it&#039;s speculated to have been retaliation for organized harassment campaigns faced by the site&#039;s users.&lt;br /&gt;
&lt;br /&gt;
* https://ddosecrets.com/wiki/Twitch&lt;br /&gt;
* [[Media:Twitchleaks-4chan.jpg|Statement from the hacker]]&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.dailydot.com/debug/twitch-leak-data/ Daily Dot: Twitch creators’ incomes, source code part of massive data leak]&lt;br /&gt;
* [https://www.dailydot.com/debug/twitch-leak-qanon-toresays-150000/ Daily Dot: Twitch leak reveals prominent QAnon streamer made $150,000 in 2 years]&lt;br /&gt;
* [https://www.theverge.com/2021/10/7/22714160/twitch-hack-security-data-breach-problems/ The Verge: Twitch’s security problems started long before this week’s hack]&lt;br /&gt;
* [https://www.theverge.com/2021/10/8/22716184/twitch-hack-jeff-bezos-pictures-defaced The Verge: Twitch defaced with pictures of Jeff Bezos]&lt;br /&gt;
* [https://www.washingtonpost.com/video-games/2021/10/08/twitch-hack-leak-minimum-wage-pay-hasan/ Washington Post: The Twitch hack revealed much more than streamer salaries]&lt;br /&gt;
* [https://www.vice.com/en/article/pkb7qg/urgent-pizza-untold-story-of-the-largest-twitch-hack-in-history Vice: ‘Urgent Pizza’: The Untold Story of the Largest Hack in Twitch’s History]&lt;br /&gt;
* [https://www.middleeasteye.net/news/turkey-twitch-money-laundering-fraud Middle East Eye: Turkey: Hackers allegedly used streaming platform Twitch to launder $10m]&lt;br /&gt;
* [https://www.washingtonpost.com/video-games/2022/01/11/twitch-bit-money-laundering-turkey-police/ Washington Post: Turkish police detain 40 people over Twitch streamer money laundering scheme]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=344</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=344"/>
		<updated>2022-01-29T02:24:12Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* VMware */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=343</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=343"/>
		<updated>2022-01-29T02:21:40Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMware ==&lt;br /&gt;
* https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=342</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=342"/>
		<updated>2022-01-29T02:01:40Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* https://github.com/CravateRouge/bloodyAD&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMWare ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md Taking over VMware Vcenter 6.7.0 or 7.0]&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: [https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy The story about how I compromised 300 stores, and a “Spanish consultancy”]&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=341</id>
		<title>Academy of Public Administration (Belarus)</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=341"/>
		<updated>2022-01-26T01:53:05Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Two hacks wiping and encrypting the internal network of the Academy of Public Administration in Belarus, by [[Cyber Partisans]].&lt;br /&gt;
&lt;br /&gt;
* Video of the second hack: https://www.youtube.com/watch?v=8l4etG0YKKQ&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit on an unpatched Windows 2008 server that had RDP exposed to the internet. They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.&lt;br /&gt;
&lt;br /&gt;
https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=340</id>
		<title>Academy of Public Administration (Belarus)</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=340"/>
		<updated>2022-01-26T01:51:31Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Explanation of the Hack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Two hacks wiping and encrypting the internal network of the Academy of Public Administration in Belarus, by [[Cyber Partisans]].&lt;br /&gt;
&lt;br /&gt;
* Video of the second hack: https://www.youtube.com/watch?v=8l4etG0YKKQ&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit on an unpatched Windows 2008 server that had RDP exposed to the internet (on a non-standard port.) They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.&lt;br /&gt;
&lt;br /&gt;
https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Cyber_Partisans&amp;diff=339</id>
		<title>Cyber Partisans</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Cyber_Partisans&amp;diff=339"/>
		<updated>2022-01-26T01:19:46Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cyber Partisans (Кибер-Партизаны) is a Belarusian hacktivist collective known for its attacks against the Belarusian government after the 2020 presidential election and subsequent protests.&lt;br /&gt;
&lt;br /&gt;
* Telegram channel: http://t.me/cpartisans&lt;br /&gt;
* Release telegram channel: https://t.me/cpartisans_dumps&lt;br /&gt;
* Twitter: https://twitter.com/cpartisans&lt;br /&gt;
* Youtube: https://www.youtube.com/c/cpartisans&lt;br /&gt;
* Manifesto: https://telegra.ph/Supratsiu-Manifesto-08-24&lt;br /&gt;
* List of previous actions: https://telegra.ph/Spisok-akcij-i-prodelannoj-raboty-dvizheniya-Suprac%D1%96%D1%9E-05-20&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.bloomberg.com/news/articles/2021-08-24/belarus-hackers-seek-to-overthrow-local-government Bloomberg News: Hackers Release Data Trove From Belarus in Bid to Overthrow Lukashenko Regime]&lt;br /&gt;
* [https://www.technologyreview.com/2021/08/26/1033205/belarus-cyber-partisans-lukashenko-hack-opposition/ MIT Technology Review: Hackers are trying to topple Belarus’s dictator, with help from the inside]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Cyber_Partisans&amp;diff=338</id>
		<title>Cyber Partisans</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Cyber_Partisans&amp;diff=338"/>
		<updated>2022-01-26T01:14:29Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cyber Partisans (Belarusian: кіберпартызаны, Russian: киберпартизаны) is a Belarusian hacktivist collective known for its attacks against the Belarusian government after the 2020 presidential election and subsequent protests.&lt;br /&gt;
&lt;br /&gt;
* Telegram channel: http://t.me/cpartisans&lt;br /&gt;
* Twitter: https://twitter.com/cpartisans&lt;br /&gt;
* Youtube: https://www.youtube.com/c/cpartisans&lt;br /&gt;
* Manifesto: https://telegra.ph/Supratsiu-Manifesto-08-24&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.bloomberg.com/news/articles/2021-08-24/belarus-hackers-seek-to-overthrow-local-government Bloomberg News: Hackers Release Data Trove From Belarus in Bid to Overthrow Lukashenko Regime]&lt;br /&gt;
* [https://www.technologyreview.com/2021/08/26/1033205/belarus-cyber-partisans-lukashenko-hack-opposition/ MIT Technology Review: Hackers are trying to topple Belarus’s dictator, with help from the inside]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Belarusian_Railway&amp;diff=337</id>
		<title>Belarusian Railway</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Belarusian_Railway&amp;diff=337"/>
		<updated>2022-01-26T00:49:09Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: Created page with &amp;quot;Hack of Belarusian Railway meant to disrupt the movement of Russian troops into Belarus and demanding the release of political prisoners in exchange for ransomware decryption keys, by Cyber Partisans.  * https://www.reuters.com/legal/litigation/belarusian-group-claims-hack-railway-system-after-russian-troop-moves-2022-01-24/ * https://www.bloomberg.com/news/articles/2022-01-24/hackers-say-they-breached-belarusian-rail-to-stop-russian-troops  == Explanation of the Hac...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of Belarusian Railway meant to disrupt the movement of Russian troops into Belarus and demanding the release of political prisoners in exchange for ransomware decryption keys, by [[Cyber Partisans]].&lt;br /&gt;
&lt;br /&gt;
* https://www.reuters.com/legal/litigation/belarusian-group-claims-hack-railway-system-after-russian-troop-moves-2022-01-24/&lt;br /&gt;
* https://www.bloomberg.com/news/articles/2022-01-24/hackers-say-they-breached-belarusian-rail-to-stop-russian-troops&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
According to the hackers, they used similar methods during their previous hack of the [[Academy of Public Administration (Belarus)|Academy of Public Administration]].&lt;br /&gt;
&lt;br /&gt;
https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=336</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=336"/>
		<updated>2022-01-26T00:38:27Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* 2022 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Patriot Front]]&lt;br /&gt;
* [[Belarusian Railway]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=335</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=335"/>
		<updated>2022-01-26T00:37:45Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* 2021 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[Academy of Public Administration (Belarus)]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Patriot Front]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=334</id>
		<title>Academy of Public Administration (Belarus)</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Academy_of_Public_Administration_(Belarus)&amp;diff=334"/>
		<updated>2022-01-26T00:37:00Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: Created page with &amp;quot;Two hacks wiping and encrypting the internal network of the Academy of Public Administration in Belarus, by Cyber Partisans.  * Video of the second hack: https://www.youtube.com/watch?v=8l4etG0YKKQ  == Explanation of the Hack ==  According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit in an unpatched Windows 2008 server that had its RDP port exposed to the internet. T...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Two hacks wiping and encrypting the internal network of the Academy of Public Administration in Belarus, by [[Cyber Partisans]].&lt;br /&gt;
&lt;br /&gt;
* Video of the second hack: https://www.youtube.com/watch?v=8l4etG0YKKQ&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
According to an incident report leaked by the hackers themselves during the second hack, they gained initial access using the CVE-2019-0708 BlueKeep exploit in an unpatched Windows 2008 server that had its RDP port exposed to the internet. They proceeded to dump local user credentials using [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/87be30d3b286677d878f98b7f49b81844fb7f474/Methodology%20and%20Resources/Windows%20-%20Mimikatz.md#mimikatz---mini-dump mimikatz], tunneled out using [https://github.com/jpillora/chisel chisel] and [https://github.com/3proxy/3proxy 3proxy] to use RDP and [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/1a3058f40c145a7c97fc71444cf3f1f38e3b4614/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md#psexecpy--smbexecpy--wmiexecpy psexec.py] for lateral movement on the internal network until landing on and taking over the domain controller. They then deleted data from both live and backup systems.&lt;br /&gt;
&lt;br /&gt;
https://www.curatedintel.org/2022/01/hacktivist-group-shares-details-related.html&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=333</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=333"/>
		<updated>2022-01-22T06:52:35Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* 2021 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[Metropolitan Police Department D.C.]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Patriot Front]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=332</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=332"/>
		<updated>2022-01-22T06:50:49Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Perceptics]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Patriot Front]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Myanmar_Investments&amp;diff=331</id>
		<title>Myanmar Investments</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Myanmar_Investments&amp;diff=331"/>
		<updated>2022-01-22T06:27:13Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Media Coverage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of thousands of documents from the Myanmar Investment Commission following the 2021 coup d&#039;état and protests by Sugondese separatist Bofa. &lt;br /&gt;
&lt;br /&gt;
* https://ddosecrets.com/wiki/Myanmar_Investments&lt;br /&gt;
* [https://bofa.substack.com/p/full-disclosure-dica-ims-privilege Statement from the hacker (English)]&lt;br /&gt;
* [https://bofa.substack.com/p/-dica-ims-privilege-escalation-exploit Statement from the hacker (Burmese)]&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The hacker breached a low-privileged account to gain access to a web-based investment management portal. &lt;br /&gt;
&lt;br /&gt;
She then exploited a broken access control vulnerability to create a new admin account with full access to the leaked documents.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/how-hundreds-of-millions-of-dollars-from-mytel-consumers-will-flow-to-military-generals How hundreds of millions of dollars from Mytel subscribers will flow to military generals]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/mapping-the-myanmar-military-cartels-global-reach-through-posco Mapping the Myanmar Military Cartel’s global reach through POSCO]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/land-lease-payments-tie-japanese-gov-and-investors-to-myanmars-military Land lease payments tie Japanese gov and investors to Myanmar&#039;s military]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/dirty-secrets-3-min-aung-hlaings-daughter-in-secret-deal-with-mytel Min Aung Hlaing’s daughter in secret deal with Mytel]&lt;br /&gt;
* [https://www.lemonde.fr/international/article/2021/05/04/birmanie-comment-total-finance-les-generaux-a-travers-des-comptes-offshore_6078990_3210.html Birmanie: comment Total finance les généraux à travers des comptes offshore]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/total-profiteering Is Total profiteering in Myanmar?]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/myanmar-military-controlled-businesses-associates-that-require-targeted-sanctions Myanmar military-controlled businesses and associates that require targeted sanctions]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/htoo-groups-business-with-the-myanmar-military Htoo Group’s business with the Myanmar military]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/boycott-and-coup-attempt-cost-mytel-usd-24-9-million-in-three-months Boycott and coup attempt cost Mytel USD$24.9 million in three months]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/international-businesses-linked-to-the-quartermaster-general International businesses linked to the Quartermaster General]&lt;br /&gt;
* [https://www.nytimes.com/2021/12/24/world/asia/myanmar-coup-military-tatmadaw-kyaw-thaung.html NYTimes: Worldly, Charming, and Quietly Equipping a Brutal Military]&lt;br /&gt;
* [https://www.reuters.com/business/energy/french-company-totalenergies-withdraws-myanmar-2022-01-21/ Reuters: Oil majors TotalEnergies and Chevron withdraw from Myanmar] &lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=330</id>
		<title>Patriot Front</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=330"/>
		<updated>2022-01-22T06:04:44Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Leak of RocketChat messages and other data from U.S. neo-nazi hate group Patriot Front, published by Unicorn Riot and DDoSecrets.&lt;br /&gt;
&lt;br /&gt;
* https://discordleaks.unicornriot.ninja/rocket-chat/&lt;br /&gt;
* https://vault.unicornriot.ninja/patriotfrontleaks/&lt;br /&gt;
* https://ddosecrets.com/wiki/Patriot_Front&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The leaked chatlogs cut off as members of the #tech-team channel discover a hidden backdoor harvesting credentials from the RocketChat login page, inserted by a suspected infiltrator with admin rights, who they realize must be one of them. There is also discussion of server logs for an outgoing message webhook firing that wasn&#039;t listed in the RocketChat server settings. It&#039;s unclear if either of these things is related to the leak.&lt;br /&gt;
&lt;br /&gt;
https://discordleaks.unicornriot.ninja/rocket-chat/room/97f5b993-3c92-434d-a0ff-9a6afa764218&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://unicornriot.ninja/2022/patriot-front-fascist-leak-exposes-nationwide-racist-campaigns/&lt;br /&gt;
* https://www.dailydot.com/debug/patriot-front-leak-march-for-life/&lt;br /&gt;
* https://gizmodo.com/patriot-front-leak-data-breach-hate-crimes-1848401943&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=329</id>
		<title>Patriot Front</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=329"/>
		<updated>2022-01-22T05:59:16Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Explanation of the Hack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Leak of RocketChat messages and other data from U.S. neo-nazi hate group Patriot Front, published by Unicorn Riot and DDoSecrets.&lt;br /&gt;
&lt;br /&gt;
* https://discordleaks.unicornriot.ninja/rocket-chat/&lt;br /&gt;
* https://ddosecrets.com/wiki/Patriot_Front&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The leaked chatlogs cut off as members of the #tech-team channel discover a hidden backdoor harvesting credentials from the RocketChat login page, inserted by a suspected infiltrator with admin rights, who they realize must be one of them. There is also discussion of server logs for an outgoing message webhook firing that wasn&#039;t listed in the RocketChat server settings. It&#039;s unclear if either of these things is related to the leak.&lt;br /&gt;
&lt;br /&gt;
https://discordleaks.unicornriot.ninja/rocket-chat/room/97f5b993-3c92-434d-a0ff-9a6afa764218&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://unicornriot.ninja/2022/patriot-front-fascist-leak-exposes-nationwide-racist-campaigns/&lt;br /&gt;
* https://www.dailydot.com/debug/patriot-front-leak-march-for-life/&lt;br /&gt;
* https://gizmodo.com/patriot-front-leak-data-breach-hate-crimes-1848401943&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=328</id>
		<title>Patriot Front</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=328"/>
		<updated>2022-01-22T05:58:35Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Explanation of the Hack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Leak of RocketChat messages and other data from U.S. neo-nazi hate group Patriot Front, published by Unicorn Riot and DDoSecrets.&lt;br /&gt;
&lt;br /&gt;
* https://discordleaks.unicornriot.ninja/rocket-chat/&lt;br /&gt;
* https://ddosecrets.com/wiki/Patriot_Front&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The leaked chatlogs cut off as members of the #tech-team channel discover a hidden backdoor harvesting credentials from the RocketChat login page, inserted by a suspected infiltrator with admin rights, who they realize must be one of them. There is also discussion of logs for an outgoing message webhook firing that wasn&#039;t listed in the RocketChat server settings. It&#039;s unclear if either of these things is related to the leak.&lt;br /&gt;
&lt;br /&gt;
https://discordleaks.unicornriot.ninja/rocket-chat/room/97f5b993-3c92-434d-a0ff-9a6afa764218&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://unicornriot.ninja/2022/patriot-front-fascist-leak-exposes-nationwide-racist-campaigns/&lt;br /&gt;
* https://www.dailydot.com/debug/patriot-front-leak-march-for-life/&lt;br /&gt;
* https://gizmodo.com/patriot-front-leak-data-breach-hate-crimes-1848401943&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=327</id>
		<title>Patriot Front</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=327"/>
		<updated>2022-01-22T05:57:21Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* Explanation of the Hack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Leak of RocketChat messages and other data from U.S. neo-nazi hate group Patriot Front, published by Unicorn Riot and DDoSecrets.&lt;br /&gt;
&lt;br /&gt;
* https://discordleaks.unicornriot.ninja/rocket-chat/&lt;br /&gt;
* https://ddosecrets.com/wiki/Patriot_Front&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The leaked chatlogs cut off as members of the #tech-team channel discover a hidden backdoor harvesting credentials from the RocketChat login page, inserted by a suspected infiltrator with admin rights. There is also discussion of logs for an outgoing message webhook firing that wasn&#039;t listed in the RocketChat server settings. It&#039;s unclear if either of these things is related to the leak.&lt;br /&gt;
&lt;br /&gt;
https://discordleaks.unicornriot.ninja/rocket-chat/room/97f5b993-3c92-434d-a0ff-9a6afa764218&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://unicornriot.ninja/2022/patriot-front-fascist-leak-exposes-nationwide-racist-campaigns/&lt;br /&gt;
* https://www.dailydot.com/debug/patriot-front-leak-march-for-life/&lt;br /&gt;
* https://gizmodo.com/patriot-front-leak-data-breach-hate-crimes-1848401943&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=326</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=326"/>
		<updated>2022-01-22T05:56:46Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;br /&gt;
&lt;br /&gt;
== 2022 ==&lt;br /&gt;
* [[Patriot Front]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=325</id>
		<title>Patriot Front</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Patriot_Front&amp;diff=325"/>
		<updated>2022-01-22T05:55:17Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: Created page with &amp;quot;Leak of RocketChat messages and other data from U.S. neo-nazi hate group Patriot Front, published by Unicorn Riot and DDoSecrets.  * https://discordleaks.unicornriot.ninja/rocket-chat/ * https://ddosecrets.com/wiki/Patriot_Front  == Explanation of the Hack ==  The leaked logs cut off as members of the #tech-team channel discover a hidden backdoor harvesting credentials from the RocketChat login page, inserted by a suspected infiltrator with admin rights. There is also di...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Leak of RocketChat messages and other data from U.S. neo-nazi hate group Patriot Front, published by Unicorn Riot and DDoSecrets.&lt;br /&gt;
&lt;br /&gt;
* https://discordleaks.unicornriot.ninja/rocket-chat/&lt;br /&gt;
* https://ddosecrets.com/wiki/Patriot_Front&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The leaked logs cut off as members of the #tech-team channel discover a hidden backdoor harvesting credentials from the RocketChat login page, inserted by a suspected infiltrator with admin rights. There is also discussion of logs for an outgoing message webhook firing that wasn&#039;t listed in the RocketChat server settings. It&#039;s unclear if either of these things is related to the leak.&lt;br /&gt;
&lt;br /&gt;
https://discordleaks.unicornriot.ninja/rocket-chat/room/97f5b993-3c92-434d-a0ff-9a6afa764218&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* https://unicornriot.ninja/2022/patriot-front-fascist-leak-exposes-nationwide-racist-campaigns/&lt;br /&gt;
* https://www.dailydot.com/debug/patriot-front-leak-march-for-life/&lt;br /&gt;
* https://gizmodo.com/patriot-front-leak-data-breach-hate-crimes-1848401943&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=324</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=324"/>
		<updated>2022-01-21T21:43:05Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound/Jackdaw&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMWare ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md Taking over VMware Vcenter 6.7.0 or 7.0]&lt;br /&gt;
&lt;br /&gt;
== RocketChat ==&lt;br /&gt;
* Account hijacking and RCE as admin: [https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spanish-consultancy The story about how I compromised 300 stores, and a “Spanish consultancy”]&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=323</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=323"/>
		<updated>2022-01-20T14:54:35Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Iron March]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Iron_March&amp;diff=322</id>
		<title>Iron March</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Iron_March&amp;diff=322"/>
		<updated>2022-01-20T14:53:40Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: Created page with &amp;quot;Hack of white nationalist messaging board Iron March.  Iron March was shut down due to getting hacked in 2017 and had a copy of its database uploaded by an anonymous user to the Internet Archive in 2019.  https://ddosecrets.com/wiki/Iron_March  == Media Coverage ==  * [https://www.bellingcat.com/resources/how-tos/2019/11/06/massive-white-supremacist-message-board-leak-how-to-access-and-interpret-the-data/ Bellingcat: Massive White Supremacist Message Board Leak: How to A...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of white nationalist messaging board Iron March.&lt;br /&gt;
&lt;br /&gt;
Iron March was shut down due to getting hacked in 2017 and had a copy of its database uploaded by an anonymous user to the Internet Archive in 2019.&lt;br /&gt;
&lt;br /&gt;
https://ddosecrets.com/wiki/Iron_March&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.bellingcat.com/resources/how-tos/2019/11/06/massive-white-supremacist-message-board-leak-how-to-access-and-interpret-the-data/ Bellingcat: Massive White Supremacist Message Board Leak: How to Access and Interpret the Data]&lt;br /&gt;
* [https://www.bellingcat.com/news/americas/2019/11/13/american-active-duty-servicemen-discovered-in-neo-nazi-forum-leak/ Bellingcat: American Active-Duty Servicemen Discovered in Neo-Nazi Forum Leak]&lt;br /&gt;
* [https://www.bellingcat.com/news/2019/12/19/transnational-white-terror-exposing-atomwaffen-and-the-iron-march-networks/ Bellingcat: Transnational White Terror: Exposing Atomwaffen And The Iron March Networks]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=320</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=320"/>
		<updated>2022-01-15T13:18:35Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound/Jackdaw&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== VMWare ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/HynekPetrak/HynekPetrak/blob/master/take_over_vcenter_670.md Taking over VMware Vcenter 6.7.0 or 7.0]&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=SRS_Electronic_Declaration_System&amp;diff=310</id>
		<title>SRS Electronic Declaration System</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=SRS_Electronic_Declaration_System&amp;diff=310"/>
		<updated>2022-01-01T18:37:33Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of 7.5 million tax records from the Latvian State Revenue Service&#039;s Electronic Declaration System, exposing pay rises for high-ranking banking and public sector employees during the country&#039;s austerity measures, by [[wikipedia:Ilmārs Poikāns|Neo]] and the Fourth Awakening People&#039;s Army.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.theregister.com/2010/02/26/latvian_hacker_whistleblower/ The Register: Latvian hacker tweets hard on banking whistle]&lt;br /&gt;
* [https://www.theregister.com/2010/05/14/latvian_hacker_whistleblower/ The Register: Latvia&#039;s &#039;Robin Hood&#039; hacker unmasked as AI researcher]&lt;br /&gt;
* [https://eng.lsm.lv/article/society/society/president-pardons-whistleblower-neo.a261433/ Public broadcasting of Latvia: President pardons whistleblower &#039;Neo&#039;]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=SRS_Electronic_Declaration_System&amp;diff=309</id>
		<title>SRS Electronic Declaration System</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=SRS_Electronic_Declaration_System&amp;diff=309"/>
		<updated>2022-01-01T18:36:40Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of 7.5 million tax records from the Latvian State Revenue Service&#039;s Electronic Declaration System, exposing pay rises for high-ranking banking and public sector employees during the country&#039;s austerity measures, by [[wikipedia:Ilmārs Poikāns|Neo]] of the Fourth Awakening People&#039;s Army.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.theregister.com/2010/02/26/latvian_hacker_whistleblower/ The Register: Latvian hacker tweets hard on banking whistle]&lt;br /&gt;
* [https://www.theregister.com/2010/05/14/latvian_hacker_whistleblower/ The Register: Latvia&#039;s &#039;Robin Hood&#039; hacker unmasked as AI researcher]&lt;br /&gt;
* [https://eng.lsm.lv/article/society/society/president-pardons-whistleblower-neo.a261433/ Public broadcasting of Latvia: President pardons whistleblower &#039;Neo&#039;]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=308</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=308"/>
		<updated>2022-01-01T18:27:50Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[SRS Electronic Declaration System]]&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=SRS_Electronic_Declaration_System&amp;diff=307</id>
		<title>SRS Electronic Declaration System</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=SRS_Electronic_Declaration_System&amp;diff=307"/>
		<updated>2022-01-01T18:27:10Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: Created page with &amp;quot;Hack of 7.5 million tax records from the Latvian State Revenue Service&amp;#039;s Electronic Declaration System, exposing pay rises for high-ranking banking and public sector employees, by Neo of the Fourth Awakening People&amp;#039;s Army.  == Media Coverage ==  * [https://www.theregister.com/2010/02/26/latvian_hacker_whistleblower/ The Register: Latvian hacker tweets hard on banking whistle] * [https://www.theregister.com/2010/05/14/latvian_hacker_whistleb...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of 7.5 million tax records from the Latvian State Revenue Service&#039;s Electronic Declaration System, exposing pay rises for high-ranking banking and public sector employees, by [[wikipedia:Ilmārs Poikāns|Neo]] of the Fourth Awakening People&#039;s Army.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.theregister.com/2010/02/26/latvian_hacker_whistleblower/ The Register: Latvian hacker tweets hard on banking whistle]&lt;br /&gt;
* [https://www.theregister.com/2010/05/14/latvian_hacker_whistleblower/ The Register: Latvia&#039;s &#039;Robin Hood&#039; hacker unmasked as AI researcher]&lt;br /&gt;
* [https://eng.lsm.lv/article/society/society/president-pardons-whistleblower-neo.a261433/ Public broadcasting of Latvia: President pardons whistleblower &#039;Neo&#039;]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Myanmar_Investments&amp;diff=306</id>
		<title>Myanmar Investments</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Myanmar_Investments&amp;diff=306"/>
		<updated>2022-01-01T17:58:51Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of thousands of documents from the Myanmar Investment Commission following the 2021 coup d&#039;état and protests by Sugondese separatist Bofa. &lt;br /&gt;
&lt;br /&gt;
* https://ddosecrets.com/wiki/Myanmar_Investments&lt;br /&gt;
* [https://bofa.substack.com/p/full-disclosure-dica-ims-privilege Statement from the hacker (English)]&lt;br /&gt;
* [https://bofa.substack.com/p/-dica-ims-privilege-escalation-exploit Statement from the hacker (Burmese)]&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The hacker breached a low-privileged account to gain access to a web-based investment management portal. &lt;br /&gt;
&lt;br /&gt;
She then exploited a broken access control vulnerability to create a new admin account with full access to the leaked documents.&lt;br /&gt;
&lt;br /&gt;
== Media Coverage ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/how-hundreds-of-millions-of-dollars-from-mytel-consumers-will-flow-to-military-generals How hundreds of millions of dollars from Mytel subscribers will flow to military generals]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/mapping-the-myanmar-military-cartels-global-reach-through-posco Mapping the Myanmar Military Cartel’s global reach through POSCO]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/land-lease-payments-tie-japanese-gov-and-investors-to-myanmars-military Land lease payments tie Japanese gov and investors to Myanmar&#039;s military]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/dirty-secrets-3-min-aung-hlaings-daughter-in-secret-deal-with-mytel Min Aung Hlaing’s daughter in secret deal with Mytel]&lt;br /&gt;
* [https://www.lemonde.fr/international/article/2021/05/04/birmanie-comment-total-finance-les-generaux-a-travers-des-comptes-offshore_6078990_3210.html Birmanie: comment Total finance les généraux à travers des comptes offshore]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/total-profiteering Is Total profiteering in Myanmar?]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/myanmar-military-controlled-businesses-associates-that-require-targeted-sanctions Myanmar military-controlled businesses and associates that require targeted sanctions]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/htoo-groups-business-with-the-myanmar-military Htoo Group’s business with the Myanmar military]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/boycott-and-coup-attempt-cost-mytel-usd-24-9-million-in-three-months Boycott and coup attempt cost Mytel USD$24.9 million in three months]&lt;br /&gt;
* [https://www.justiceformyanmar.org/stories/international-businesses-linked-to-the-quartermaster-general International businesses linked to the Quartermaster General]&lt;br /&gt;
* [https://www.nytimes.com/2021/12/24/world/asia/myanmar-coup-military-tatmadaw-kyaw-thaung.html NYTimes: Worldly, Charming, and Quietly Equipping a Brutal Military]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=291</id>
		<title>Learn to hack</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Learn_to_hack&amp;diff=291"/>
		<updated>2021-12-27T08:36:58Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page aims to compile high quality resources for hackers. All books listed on this page can be found on [https://libgen.fun/ Library Genesis] and [https://z-lib.org/ Z-Library]&lt;br /&gt;
&lt;br /&gt;
== General Resources == &lt;br /&gt;
&lt;br /&gt;
Resources that assume little to no background knowledge:&lt;br /&gt;
* https://www.hoppersroppers.org/training.html&lt;br /&gt;
* https://tryhackme.com/&lt;br /&gt;
&lt;br /&gt;
Resources that assume minimal tech background:&lt;br /&gt;
* (book) Penetration Testing: A Hands-On Introduction to Hacking&lt;br /&gt;
&lt;br /&gt;
Resources that assume a tech or hacking background:&lt;br /&gt;
* (book) The Hacker Playbook 3&lt;br /&gt;
* books by [https://b-ok.cc/g/Sparc%20Flow Sparc Flow]&lt;br /&gt;
* [[Hack Back! A DIY Guide]]&lt;br /&gt;
* https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak&lt;br /&gt;
** translated: https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/639/original/Conti_playbook_translated.pdf&lt;br /&gt;
* Bassterlord Networking Manual (translated): https://papers.vx-underground.org/papers/VXUG/Mirrors/BassterlordNetworkingManual.pdf&lt;br /&gt;
&lt;br /&gt;
Practice labs:&lt;br /&gt;
* https://www.hackthebox.com/&lt;br /&gt;
* https://www.pentesteracademy.com/&lt;br /&gt;
* https://lab.pentestit.ru/&lt;br /&gt;
* https://overthewire.org/wargames/&lt;br /&gt;
&lt;br /&gt;
General references:&lt;br /&gt;
* https://www.ired.team/&lt;br /&gt;
* http://pwnwiki.io/&lt;br /&gt;
* https://dmcxblue.gitbook.io/red-team-notes-2-0/&lt;br /&gt;
* https://github.com/swisskyrepo/PayloadsAllTheThings&lt;br /&gt;
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md An excellent practical reference]&lt;br /&gt;
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet A practical reference focused on powershell]&lt;br /&gt;
* https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a&lt;br /&gt;
* https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html&lt;br /&gt;
* https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/&lt;br /&gt;
* https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet&lt;br /&gt;
* https://wadcoms.github.io/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/&lt;br /&gt;
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/&lt;br /&gt;
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/&lt;br /&gt;
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://mpgn.gitbook.io/crackmapexec/&lt;br /&gt;
* https://www.secureauth.com/labs/open-source-tools/impacket/&lt;br /&gt;
* https://github.com/dirkjanm/mitm6&lt;br /&gt;
* https://github.com/lgandx/Responder&lt;br /&gt;
* https://github.com/FuzzySecurity/StandIn&lt;br /&gt;
* https://www.joeware.net/freetools/tools/adfind/&lt;br /&gt;
* Powerview/Sharpview&lt;br /&gt;
* Bloodhound/Sharphound/Jackdaw&lt;br /&gt;
&lt;br /&gt;
== Office 365 &amp;amp; Azure ==&lt;br /&gt;
* Extremely in-depth technical info on everything https://o365blog.com/&lt;br /&gt;
* https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html&lt;br /&gt;
* https://blog.xpnsec.com/azuread-connect-for-redteam/&lt;br /&gt;
* https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/&lt;br /&gt;
* https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* https://github.com/nyxgeek/o365recon&lt;br /&gt;
* https://github.com/dirkjanm/ROADtools&lt;br /&gt;
* https://github.com/fox-it/adconnectdump&lt;br /&gt;
* https://github.com/LMGsec/o365creeper&lt;br /&gt;
* https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html&lt;br /&gt;
* https://github.com/rvrsh3ll/TokenTactics&lt;br /&gt;
* https://github.com/nyxgeek/onedrive_user_enum&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://github.com/dafthack/MFASweep&lt;br /&gt;
&lt;br /&gt;
== GSuite ==&lt;br /&gt;
https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite&lt;br /&gt;
&lt;br /&gt;
== C2 Frameworks ==&lt;br /&gt;
&lt;br /&gt;
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
&lt;br /&gt;
== Initial Access == &lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html&lt;br /&gt;
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165&lt;br /&gt;
* https://infosecwriteups.com/recipe-for-a-successful-phishing-campaign-part-1-2-dc23d927ec55&lt;br /&gt;
* https://www.xanthus.io/mastering-the-simulated-phishing-attack&lt;br /&gt;
* https://github.com/Arno0x/EmbedInHTML&lt;br /&gt;
* https://github.com/L4bF0x/PhishingPretexts&lt;br /&gt;
* http://lockboxx.blogspot.com/2018/12/gophish-evilginx2-for-phishing.html&lt;br /&gt;
* https://book.hacktricks.xyz/phishing-methodology&lt;br /&gt;
&lt;br /&gt;
=== Password spraying ===&lt;br /&gt;
* https://github.com/dafthack/MSOLSpray&lt;br /&gt;
* https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/&lt;br /&gt;
&lt;br /&gt;
== Scanning and Recon ==&lt;br /&gt;
* https://github.com/robertdavidgraham/masscan&lt;br /&gt;
* https://github.com/projectdiscovery/naabu&lt;br /&gt;
* https://github.com/OWASP/Amass&lt;br /&gt;
* https://www.shodan.io/&lt;br /&gt;
* https://www.zoomeye.org/&lt;br /&gt;
&lt;br /&gt;
== Opsec ==&lt;br /&gt;
* https://www.qubes-os.org/&lt;br /&gt;
* https://www.whonix.org/&lt;br /&gt;
* https://tails.boum.org/&lt;br /&gt;
* The whonix wiki has lots of great info on anonymity even if you&#039;re not using whonix: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
* https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy&lt;br /&gt;
* https://veracrypt.fr/&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Paige_Thompson&amp;diff=289</id>
		<title>Paige Thompson</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Paige_Thompson&amp;diff=289"/>
		<updated>2021-12-26T11:44:14Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://edition.cnn.com/2021/06/30/tech/capital-one-hacker-new-charges/index.html Alleged Capital One hacker faces 20 years in prison for stealing 100 million customers&#039; data]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hackers]]&lt;br /&gt;
[[Category:Ongoing Cases]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Paige_Thompson&amp;diff=288</id>
		<title>Paige Thompson</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Paige_Thompson&amp;diff=288"/>
		<updated>2021-12-26T11:43:42Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: Created page with &amp;quot;[https://edition.cnn.com/2021/06/30/tech/capital-one-hacker-new-charges/index.html Alleged Capital One hacker faces 20 years in prison for stealing 100 million customers&amp;#039; data]  Category:Hackers&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://edition.cnn.com/2021/06/30/tech/capital-one-hacker-new-charges/index.html Alleged Capital One hacker faces 20 years in prison for stealing 100 million customers&#039; data]&lt;br /&gt;
&lt;br /&gt;
[[Category:Hackers]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=287</id>
		<title>Hacker History</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacker_History&amp;diff=287"/>
		<updated>2021-12-26T11:37:17Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: /* 2019 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==2008==&lt;br /&gt;
* [[Sarah Palin emails]]&lt;br /&gt;
&lt;br /&gt;
== 2010 ==&lt;br /&gt;
* [[Operation Payback]]&lt;br /&gt;
&lt;br /&gt;
== 2011 ==&lt;br /&gt;
* [[Chinga la Migra]]&lt;br /&gt;
* [[CorruptBrazil]]&lt;br /&gt;
* [[Fuck FBI Friday]]&lt;br /&gt;
* [[HBGary]]&lt;br /&gt;
* [[LeakyMails]]&lt;br /&gt;
* [[Shooting Sheriffs Saturday]]&lt;br /&gt;
* [[Sownage]]&lt;br /&gt;
* [[Stratfor]]&lt;br /&gt;
&lt;br /&gt;
== 2012 ==&lt;br /&gt;
* [[Apple UDIDs]]&lt;br /&gt;
* [[CSLEA]]&lt;br /&gt;
* [[Norton AntiVirus]]&lt;br /&gt;
* [[Syria emails]]&lt;br /&gt;
* [[Bureau Of Justice]]&lt;br /&gt;
&lt;br /&gt;
== 2013 ==&lt;br /&gt;
* [[Project AIG]]&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
* [[LulzSecPeru]]&lt;br /&gt;
* [[Gamma Group]]&lt;br /&gt;
* [[Russian Interior Ministry]]&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
* [[wikipedia:Football Leaks]]&lt;br /&gt;
* [[Hacking Team]]&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
* [[Berat Albayrak Emails]]&lt;br /&gt;
* [[Panama Papers]]&lt;br /&gt;
* [[Surkov Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
* [[Bob Otto emails]]&lt;br /&gt;
* [[Cellebrite]]&lt;br /&gt;
* [[Flexispy]]&lt;br /&gt;
* [[Freedom Hosting II]]&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
* [[Salvini emails]]&lt;br /&gt;
* [[Doxxing-Adventskalender]]&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
* [[GorraLeaks]]&lt;br /&gt;
* [[Paco Leaks]]&lt;br /&gt;
* [[Milico Leaks]]&lt;br /&gt;
* [[Capital One]]&lt;br /&gt;
* [[Cayman National Bank and Trust (Isle of Man)]]&lt;br /&gt;
* [[Varela Leaks]]&lt;br /&gt;
&lt;br /&gt;
== 2020 ==&lt;br /&gt;
* [[Luanda Leaks]]&lt;br /&gt;
* [[BlueLeaks]]&lt;br /&gt;
* [[Intel exconfidential Lake]]&lt;br /&gt;
&lt;br /&gt;
== 2021 ==&lt;br /&gt;
* [[Gab]]&lt;br /&gt;
* [[Myanmar Investments]]&lt;br /&gt;
* [[American Patriots Three Percent‎]]&lt;br /&gt;
* [[Verkada]]&lt;br /&gt;
* [[Sons of Confederate Veterans]]&lt;br /&gt;
* [[MagaCoin]]&lt;br /&gt;
* [[Electronic Arts]]&lt;br /&gt;
* [[Tea Party Patriots]]&lt;br /&gt;
* [[Cyber Partisans]]&lt;br /&gt;
* [[HART]]&lt;br /&gt;
* [[Policía Nacional Civil de El Salvador]]&lt;br /&gt;
* [[Epik]]&lt;br /&gt;
* [[Oath Keepers]]&lt;br /&gt;
* [[America&#039;s Frontline Doctors]]&lt;br /&gt;
* [[Twitch]]&lt;br /&gt;
* [[Attila Hildmann‎]]&lt;br /&gt;
* [[AnibalLeaks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Capital_One&amp;diff=286</id>
		<title>Capital One</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Capital_One&amp;diff=286"/>
		<updated>2021-12-26T11:35:10Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: Created page with &amp;quot;Hack of Capital One by erratic.  [https://edition.cnn.com/2021/06/30/tech/capital-one-hacker-new-charges/index.html CNN Business: A hacker gained access to 100 million Capital One credit card applications and accounts]  == Explanation of the Hack ==  The hacker exploited an SSRF vulnerability in ModSecurity to grab [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Request%20Forgery/README.md#ssrf-url-for-cloud-instances A...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of Capital One by [[Paige Thompson|erratic]].&lt;br /&gt;
&lt;br /&gt;
[https://edition.cnn.com/2021/06/30/tech/capital-one-hacker-new-charges/index.html CNN Business: A hacker gained access to 100 million Capital One credit card applications and accounts]&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The hacker exploited an SSRF vulnerability in ModSecurity to grab [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Request%20Forgery/README.md#ssrf-url-for-cloud-instances AWS instance credentials from the EC2 metadata service] and used them to access an S3 bucket containing credit applications.&lt;br /&gt;
&lt;br /&gt;
Even though the hacker used a combination of iPredator VPN and Tor to stay anonymous at the IP layer, she confessed to her activities in a Slack group of a local tech meetup group and uploaded exfiltration scripts to a GitHub account connected to her real identity. A member of the Slack group reported her to the FBI.&lt;br /&gt;
&lt;br /&gt;
No data from Capital One was ever leaked anywhere, but she&#039;s alleged to also have used the same exploit to deploy crypto miners.&lt;br /&gt;
&lt;br /&gt;
https://www.courtlistener.com/docket/15983291/united-states-v-thompson/&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Electronic_Arts&amp;diff=285</id>
		<title>Electronic Arts</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Electronic_Arts&amp;diff=285"/>
		<updated>2021-12-26T03:48:33Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of the video game company Electronics Arts exposing 780GB of data including source code for the company&#039;s FrostBite engine, by LAPSUS$.&lt;br /&gt;
&lt;br /&gt;
[https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code Vice: Hackers Steal Wealth of Data from Game Giant EA]&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The hackers bought a cookie that let them log into an EA slack account on Genesis Market, a marketplace for credentials stolen from computers infected with malware. The hackers then tricked an IT employee into granting them access to the company&#039;s internal network.&lt;br /&gt;
&lt;br /&gt;
* [https://www.vice.com/en/article/7kvkqb/how-ea-games-was-hacked-slack Vice: How Hackers Used Slack to Break into EA Games]&lt;br /&gt;
* [https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack Vice: Inside the Market for Cookies That Lets Hackers Pretend to Be You]&lt;br /&gt;
&lt;br /&gt;
The hackers first tried to sell the access and source code on Raidforums. The Raidforums members got the hackers in touch with a Vice journalist who interviewed them and broke news of the hack to EA. The hackers then tried to solicit said journalist to pass along an extortion message to EA. Unfortunately, the journalist refused. The hackers proceeded to blackmail the company for $100m not to release the data and Vice was then able to confirm that EA had indeed received their message. EA does not seem to have paid as the hackers have subsequently released all of the data for free.&lt;br /&gt;
&lt;br /&gt;
[https://www.vice.com/en/article/m7e57n/hackers-extort-ea-fifa Vice: Hackers Move to Extort Gaming Giant EA]&lt;br /&gt;
&lt;br /&gt;
== Ransom note ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Hello EA&lt;br /&gt;
&lt;br /&gt;
we are the Hackers who breached your src and other data&lt;br /&gt;
First of all we apologize to harm your company and reputation&lt;br /&gt;
well what is the motive behind any hack Money right ?&lt;br /&gt;
so we are here to discuss related to this thing&lt;br /&gt;
we checked your statement on media where you mentioned &amp;quot;&amp;quot;No player data was accessed, and we have no reason to believe there is any risk to player privacy,&lt;br /&gt;
Is this really true? We, in fact, got to some of your production database we have database (around 2TB of pure data)&lt;br /&gt;
As you already know&lt;br /&gt;
we have src , tools + unrevealed 2tb pure data&lt;br /&gt;
with respect you also know if we leak this it can be big trouble for your company&lt;br /&gt;
that&#039;s why i have a idea best offer to you&lt;br /&gt;
we never sell your data to anyone&lt;br /&gt;
only my team have this data if we want to kept his all private we can&lt;br /&gt;
the deal is Pay us 100 mil$ in xmr (monero)&lt;br /&gt;
we will never disclose your any type of data in public even we take full responsibility it will never leak and it will deleted from our system too&lt;br /&gt;
You have 7 days for paying us first 33.34 mil$ to the first address&lt;br /&gt;
After 8 th day we will contact news to tell them we have user data.&lt;br /&gt;
After the 9th day we will start to post some part of your source code every day on the deepweb til the first payment is completed.&lt;br /&gt;
we gave you the best offer if you pay in delay, everything will be deleted and your company can run,&lt;br /&gt;
&lt;br /&gt;
We have no interest in leaking if you pay. I know this sound like a ransomware, but just for one time, trust us. We just want money&lt;br /&gt;
&lt;br /&gt;
we know your are afraid of scammers&lt;br /&gt;
we sending you here our proof ofdata for your trust&lt;br /&gt;
&lt;br /&gt;
So, how&#039;s that we gonna proceed,&lt;br /&gt;
You will maintenance your fifa 21 servers the 5th of july at any time,&lt;br /&gt;
Before the maintenance, you will post a message on your twitter account (@EA)&lt;br /&gt;
After the first payment completed, you will have 2weeks to send the other 66.66mil USD&lt;br /&gt;
&lt;br /&gt;
Data : USER_EVENT_SESSION_ENGA... Rows : 348.0G Size : 30.3TB&lt;br /&gt;
USER_EVENT_ECONOMY Rows : 108.5G Size : 11.4TB&lt;br /&gt;
USER_EVENT_MESSAGING Rows : 190.9G Size : 11.2TB&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I really hope you understand that we are not kidding and we are friendly.&lt;br /&gt;
Thoses addresses are one time payment, mean you can&#039;t send two time to an address.&lt;br /&gt;
&lt;br /&gt;
so here is out payment address&lt;br /&gt;
&lt;br /&gt;
XMR :&lt;br /&gt;
&lt;br /&gt;
again we are sorry but you know during this pandemic we all need money , just all people ways are different&lt;br /&gt;
&lt;br /&gt;
i hope you will send the first payment in less than 7 days so we can continue&lt;br /&gt;
&lt;br /&gt;
Instruction : Well for our own reasons we don&#039;t use any direct contact with you&lt;br /&gt;
&lt;br /&gt;
we will use indirect contact method&lt;br /&gt;
So, I will give you some written content which you will post from your Twitter account so that we can understand.&lt;br /&gt;
if you are ready and make payment with the address&lt;br /&gt;
post on your twitter account : &amp;quot;maintenance from 5 July 10 to 11 UTC&lt;br /&gt;
&lt;br /&gt;
If you posted this we will understand you are ready to make the payment and we will proceed&lt;br /&gt;
&lt;br /&gt;
In Case you want to deny our golden offer&lt;br /&gt;
post :&lt;br /&gt;
or if you need some more time post &amp;quot;just report this to any reporter and made news again we so we understand you deny our offer and we will start to posting our code and start selling other sensitive data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
in one line : if you agree do a maintenance 5th of july from 10 to 11 UTC AND POST ON TWITTER&lt;br /&gt;
We need 33.34 mil in this week after this We will recontact you in some times&lt;br /&gt;
&lt;br /&gt;
When the first payment will be completed we will delete 50% of what we have&lt;br /&gt;
&lt;br /&gt;
On the third payment we will delete the database from our servers&lt;br /&gt;
&lt;br /&gt;
You will have 2 weeks to pay the others payment&lt;br /&gt;
&lt;br /&gt;
33.34 mil in this week after this We will recontact you in some times&lt;br /&gt;
&lt;br /&gt;
When the first payment will be completed we will delete 50% of what we have&lt;br /&gt;
&lt;br /&gt;
On the third payment we will delete the database from our servers&lt;br /&gt;
&lt;br /&gt;
You will have 2 weeks to pay the others payment&lt;br /&gt;
hope you will understand and pay us as fast as you can&lt;br /&gt;
&lt;br /&gt;
Last thing&lt;br /&gt;
If possible, do not tell this to the reporter and LE shits because we also do not want your reputation and worth to be down.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Electronic_Arts&amp;diff=284</id>
		<title>Electronic Arts</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Electronic_Arts&amp;diff=284"/>
		<updated>2021-12-26T03:37:18Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of the video game company Electronics Arts exposing 780GB of data including source code for the company&#039;s FrostBite engine, by LAPSUS$.&lt;br /&gt;
&lt;br /&gt;
[https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code Vice: Hackers Steal Wealth of Data from Game Giant EA]&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The hackers bought a cookie that let them log into the an EA slack account on Genesis Market, a marketplace for credentials stolen from computers infected with malware. The hackers then tricked an IT employee into granting them access to the company&#039;s internal network.&lt;br /&gt;
&lt;br /&gt;
* [https://www.vice.com/en/article/7kvkqb/how-ea-games-was-hacked-slack Vice: How Hackers Used Slack to Break into EA Games]&lt;br /&gt;
* [https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack Vice: Inside the Market for Cookies That Lets Hackers Pretend to Be You]&lt;br /&gt;
&lt;br /&gt;
The hackers first tried to sell the access and source code on Raidforums. The Raidforums members got the hackers in touch with a Vice journalist who interviewed them and broke news of the hack to EA. The hackers then tried to solicit said journalist to pass along an extortion message to EA. Unfortunately, the journalist refused. The hackers proceeded to blackmail the company for $100m not to release the data and Vice was then able to confirm that EA had indeed received their message. EA does not seem to have paid as the hackers have subsequently released all of the data for free.&lt;br /&gt;
&lt;br /&gt;
[https://www.vice.com/en/article/m7e57n/hackers-extort-ea-fifa Vice: Hackers Move to Extort Gaming Giant EA]&lt;br /&gt;
&lt;br /&gt;
== Ransom note ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Hello EA&lt;br /&gt;
&lt;br /&gt;
we are the Hackers who breached your src and other data&lt;br /&gt;
First of all we apologize to harm your company and reputation&lt;br /&gt;
well what is the motive behind any hack Money right ?&lt;br /&gt;
so we are here to discuss related to this thing&lt;br /&gt;
we checked your statement on media where you mentioned &amp;quot;&amp;quot;No player data was accessed, and we have no reason to believe there is any risk to player privacy,&lt;br /&gt;
Is this really true? We, in fact, got to some of your production database we have database (around 2TB of pure data)&lt;br /&gt;
As you already know&lt;br /&gt;
we have src , tools + unrevealed 2tb pure data&lt;br /&gt;
with respect you also know if we leak this it can be big trouble for your company&lt;br /&gt;
that&#039;s why i have a idea best offer to you&lt;br /&gt;
we never sell your data to anyone&lt;br /&gt;
only my team have this data if we want to kept his all private we can&lt;br /&gt;
the deal is Pay us 100 mil$ in xmr (monero)&lt;br /&gt;
we will never disclose your any type of data in public even we take full responsibility it will never leak and it will deleted from our system too&lt;br /&gt;
You have 7 days for paying us first 33.34 mil$ to the first address&lt;br /&gt;
After 8 th day we will contact news to tell them we have user data.&lt;br /&gt;
After the 9th day we will start to post some part of your source code every day on the deepweb til the first payment is completed.&lt;br /&gt;
we gave you the best offer if you pay in delay, everything will be deleted and your company can run,&lt;br /&gt;
&lt;br /&gt;
We have no interest in leaking if you pay. I know this sound like a ransomware, but just for one time, trust us. We just want money&lt;br /&gt;
&lt;br /&gt;
we know your are afraid of scammers&lt;br /&gt;
we sending you here our proof ofdata for your trust&lt;br /&gt;
&lt;br /&gt;
So, how&#039;s that we gonna proceed,&lt;br /&gt;
You will maintenance your fifa 21 servers the 5th of july at any time,&lt;br /&gt;
Before the maintenance, you will post a message on your twitter account (@EA)&lt;br /&gt;
After the first payment completed, you will have 2weeks to send the other 66.66mil USD&lt;br /&gt;
&lt;br /&gt;
Data : USER_EVENT_SESSION_ENGA... Rows : 348.0G Size : 30.3TB&lt;br /&gt;
USER_EVENT_ECONOMY Rows : 108.5G Size : 11.4TB&lt;br /&gt;
USER_EVENT_MESSAGING Rows : 190.9G Size : 11.2TB&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I really hope you understand that we are not kidding and we are friendly.&lt;br /&gt;
Thoses addresses are one time payment, mean you can&#039;t send two time to an address.&lt;br /&gt;
&lt;br /&gt;
so here is out payment address&lt;br /&gt;
&lt;br /&gt;
XMR :&lt;br /&gt;
&lt;br /&gt;
again we are sorry but you know during this pandemic we all need money , just all people ways are different&lt;br /&gt;
&lt;br /&gt;
i hope you will send the first payment in less than 7 days so we can continue&lt;br /&gt;
&lt;br /&gt;
Instruction : Well for our own reasons we don&#039;t use any direct contact with you&lt;br /&gt;
&lt;br /&gt;
we will use indirect contact method&lt;br /&gt;
So, I will give you some written content which you will post from your Twitter account so that we can understand.&lt;br /&gt;
if you are ready and make payment with the address&lt;br /&gt;
post on your twitter account : &amp;quot;maintenance from 5 July 10 to 11 UTC&lt;br /&gt;
&lt;br /&gt;
If you posted this we will understand you are ready to make the payment and we will proceed&lt;br /&gt;
&lt;br /&gt;
In Case you want to deny our golden offer&lt;br /&gt;
post :&lt;br /&gt;
or if you need some more time post &amp;quot;just report this to any reporter and made news again we so we understand you deny our offer and we will start to posting our code and start selling other sensitive data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
in one line : if you agree do a maintenance 5th of july from 10 to 11 UTC AND POST ON TWITTER&lt;br /&gt;
We need 33.34 mil in this week after this We will recontact you in some times&lt;br /&gt;
&lt;br /&gt;
When the first payment will be completed we will delete 50% of what we have&lt;br /&gt;
&lt;br /&gt;
On the third payment we will delete the database from our servers&lt;br /&gt;
&lt;br /&gt;
You will have 2 weeks to pay the others payment&lt;br /&gt;
&lt;br /&gt;
33.34 mil in this week after this We will recontact you in some times&lt;br /&gt;
&lt;br /&gt;
When the first payment will be completed we will delete 50% of what we have&lt;br /&gt;
&lt;br /&gt;
On the third payment we will delete the database from our servers&lt;br /&gt;
&lt;br /&gt;
You will have 2 weeks to pay the others payment&lt;br /&gt;
hope you will understand and pay us as fast as you can&lt;br /&gt;
&lt;br /&gt;
Last thing&lt;br /&gt;
If possible, do not tell this to the reporter and LE shits because we also do not want your reputation and worth to be down.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Electronic_Arts&amp;diff=283</id>
		<title>Electronic Arts</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Electronic_Arts&amp;diff=283"/>
		<updated>2021-12-26T03:33:04Z</updated>

		<summary type="html">&lt;p&gt;Amongomous: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hack of the video game company Electronics Arts exposing 780GB of data including source code for the company&#039;s FrostBite engine, by LAPSUS$.&lt;br /&gt;
&lt;br /&gt;
[https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code Vice: Hackers Steal Wealth of Data from Game Giant EA]&lt;br /&gt;
&lt;br /&gt;
== Explanation of the Hack ==&lt;br /&gt;
&lt;br /&gt;
The hackers bought a cookie that let them log into the an EA slack account on Genesis Market, a marketplace for credentials stolen from computers infected with malware. The hackers then tricked an IT employee into granting them access to the company&#039;s internal network.&lt;br /&gt;
&lt;br /&gt;
* [https://www.vice.com/en/article/7kvkqb/how-ea-games-was-hacked-slack Vice: How Hackers Used Slack to Break into EA Games]&lt;br /&gt;
* [https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack Vice: Inside the Market for Cookies That Lets Hackers Pretend to Be You]&lt;br /&gt;
&lt;br /&gt;
The hackers first tried to sell the access and source code on Raidforums. The Raidforums members got the hackers in touch with a Vice journalist who interviewed them and broke news of the hack to EA. The hackers then tried to solicit said journalist to pass along a ransom message to EA. Unfortunately, the journalist refused. The hackers proceeded to send a ransom message asking for $100m not to release the data and Vice was then able to confirm that EA had indeed received it. EA does not seem to have paid as the hackers have subsequently released all of the data for free.&lt;br /&gt;
&lt;br /&gt;
[https://www.vice.com/en/article/m7e57n/hackers-extort-ea-fifa Vice: Hackers Move to Extort Gaming Giant EA]&lt;br /&gt;
&lt;br /&gt;
== Ransom message ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Hello EA&lt;br /&gt;
&lt;br /&gt;
we are the Hackers who breached your src and other data&lt;br /&gt;
First of all we apologize to harm your company and reputation&lt;br /&gt;
well what is the motive behind any hack Money right ?&lt;br /&gt;
so we are here to discuss related to this thing&lt;br /&gt;
we checked your statement on media where you mentioned &amp;quot;&amp;quot;No player data was accessed, and we have no reason to believe there is any risk to player privacy,&lt;br /&gt;
Is this really true? We, in fact, got to some of your production database we have database (around 2TB of pure data)&lt;br /&gt;
As you already know&lt;br /&gt;
we have src , tools + unrevealed 2tb pure data&lt;br /&gt;
with respect you also know if we leak this it can be big trouble for your company&lt;br /&gt;
that&#039;s why i have a idea best offer to you&lt;br /&gt;
we never sell your data to anyone&lt;br /&gt;
only my team have this data if we want to kept his all private we can&lt;br /&gt;
the deal is Pay us 100 mil$ in xmr (monero)&lt;br /&gt;
we will never disclose your any type of data in public even we take full responsibility it will never leak and it will deleted from our system too&lt;br /&gt;
You have 7 days for paying us first 33.34 mil$ to the first address&lt;br /&gt;
After 8 th day we will contact news to tell them we have user data.&lt;br /&gt;
After the 9th day we will start to post some part of your source code every day on the deepweb til the first payment is completed.&lt;br /&gt;
we gave you the best offer if you pay in delay, everything will be deleted and your company can run,&lt;br /&gt;
&lt;br /&gt;
We have no interest in leaking if you pay. I know this sound like a ransomware, but just for one time, trust us. We just want money&lt;br /&gt;
&lt;br /&gt;
we know your are afraid of scammers&lt;br /&gt;
we sending you here our proof ofdata for your trust&lt;br /&gt;
&lt;br /&gt;
So, how&#039;s that we gonna proceed,&lt;br /&gt;
You will maintenance your fifa 21 servers the 5th of july at any time,&lt;br /&gt;
Before the maintenance, you will post a message on your twitter account (@EA)&lt;br /&gt;
After the first payment completed, you will have 2weeks to send the other 66.66mil USD&lt;br /&gt;
&lt;br /&gt;
Data : USER_EVENT_SESSION_ENGA... Rows : 348.0G Size : 30.3TB&lt;br /&gt;
USER_EVENT_ECONOMY Rows : 108.5G Size : 11.4TB&lt;br /&gt;
USER_EVENT_MESSAGING Rows : 190.9G Size : 11.2TB&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I really hope you understand that we are not kidding and we are friendly.&lt;br /&gt;
Thoses addresses are one time payment, mean you can&#039;t send two time to an address.&lt;br /&gt;
&lt;br /&gt;
so here is out payment address&lt;br /&gt;
&lt;br /&gt;
XMR :&lt;br /&gt;
&lt;br /&gt;
again we are sorry but you know during this pandemic we all need money , just all people ways are different&lt;br /&gt;
&lt;br /&gt;
i hope you will send the first payment in less than 7 days so we can continue&lt;br /&gt;
&lt;br /&gt;
Instruction : Well for our own reasons we don&#039;t use any direct contact with you&lt;br /&gt;
&lt;br /&gt;
we will use indirect contact method&lt;br /&gt;
So, I will give you some written content which you will post from your Twitter account so that we can understand.&lt;br /&gt;
if you are ready and make payment with the address&lt;br /&gt;
post on your twitter account : &amp;quot;maintenance from 5 July 10 to 11 UTC&lt;br /&gt;
&lt;br /&gt;
If you posted this we will understand you are ready to make the payment and we will proceed&lt;br /&gt;
&lt;br /&gt;
In Case you want to deny our golden offer&lt;br /&gt;
post :&lt;br /&gt;
or if you need some more time post &amp;quot;just report this to any reporter and made news again we so we understand you deny our offer and we will start to posting our code and start selling other sensitive data&amp;quot;&lt;br /&gt;
&lt;br /&gt;
in one line : if you agree do a maintenance 5th of july from 10 to 11 UTC AND POST ON TWITTER&lt;br /&gt;
We need 33.34 mil in this week after this We will recontact you in some times&lt;br /&gt;
&lt;br /&gt;
When the first payment will be completed we will delete 50% of what we have&lt;br /&gt;
&lt;br /&gt;
On the third payment we will delete the database from our servers&lt;br /&gt;
&lt;br /&gt;
You will have 2 weeks to pay the others payment&lt;br /&gt;
&lt;br /&gt;
33.34 mil in this week after this We will recontact you in some times&lt;br /&gt;
&lt;br /&gt;
When the first payment will be completed we will delete 50% of what we have&lt;br /&gt;
&lt;br /&gt;
On the third payment we will delete the database from our servers&lt;br /&gt;
&lt;br /&gt;
You will have 2 weeks to pay the others payment&lt;br /&gt;
hope you will understand and pay us as fast as you can&lt;br /&gt;
&lt;br /&gt;
Last thing&lt;br /&gt;
If possible, do not tell this to the reporter and LE shits because we also do not want your reputation and worth to be down.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Hacks]]&lt;/div&gt;</summary>
		<author><name>Amongomous</name></author>
	</entry>
</feed>