<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://enlacehacktivista.org/index.php?action=history&amp;feed=atom&amp;title=Hacking_Windows</id>
	<title>Hacking Windows - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://enlacehacktivista.org/index.php?action=history&amp;feed=atom&amp;title=Hacking_Windows"/>
	<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacking_Windows&amp;action=history"/>
	<updated>2026-05-02T14:12:23Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacking_Windows&amp;diff=1646&amp;oldid=prev</id>
		<title>Booda at 15:49, 8 October 2023</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacking_Windows&amp;diff=1646&amp;oldid=prev"/>
		<updated>2023-10-08T15:49:27Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:49, 8 October 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l27&quot;&gt;Line 27:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 27:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* https://amsi.fail&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* https://amsi.fail&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20AMSI%20Bypass.md https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology and Resources/Windows - AMSI Bypass.md]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20AMSI%20Bypass.md https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology and Resources/Windows - AMSI Bypass.md]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;== Persistence ==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Persistence.md Windows - Persistence]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
	<entry>
		<id>https://enlacehacktivista.org/index.php?title=Hacking_Windows&amp;diff=1381&amp;oldid=prev</id>
		<title>Booda: Created page with &quot;Find common vulnerabilities and misconfigurations in a windows environment to escalate your privileges: [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS winPEAS] * Living Off The Land Binaries, Scripts and Libraries: https://lolbas-project.github.io * Living off the land. Evading detection with Sysinternals: https://live.sysinternals.com (\\live.sysinternals.com\tools) * mimikatz: https://github.com/gentilkiwi/mimikatz/releases * https://github.com/fortra...&quot;</title>
		<link rel="alternate" type="text/html" href="https://enlacehacktivista.org/index.php?title=Hacking_Windows&amp;diff=1381&amp;oldid=prev"/>
		<updated>2023-08-04T15:54:51Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Find common vulnerabilities and misconfigurations in a windows environment to escalate your privileges: [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS winPEAS] * Living Off The Land Binaries, Scripts and Libraries: https://lolbas-project.github.io * Living off the land. Evading detection with Sysinternals: https://live.sysinternals.com (\\live.sysinternals.com\tools) * &lt;a href=&quot;/index.php/Mimikatz&quot; title=&quot;Mimikatz&quot;&gt;mimikatz&lt;/a&gt;: https://github.com/gentilkiwi/mimikatz/releases * https://github.com/fortra...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Find common vulnerabilities and misconfigurations in a windows environment to escalate your privileges: [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS winPEAS]&lt;br /&gt;
* Living Off The Land Binaries, Scripts and Libraries: https://lolbas-project.github.io&lt;br /&gt;
* Living off the land. Evading detection with Sysinternals: https://live.sysinternals.com (\\live.sysinternals.com\tools)&lt;br /&gt;
* [[mimikatz]]: https://github.com/gentilkiwi/mimikatz/releases&lt;br /&gt;
* https://github.com/fortra/impacket&lt;br /&gt;
* [[Disable Defender]]&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Using%20credentials.md Windows - Using credentials]&lt;br /&gt;
* Credential Access &amp;amp; Dumping: https://www.ired.team/offensive-security/credential-access-and-credential-dumping&lt;br /&gt;
* Lateral Movement: https://www.ired.team/offensive-security/lateral-movement&lt;br /&gt;
&lt;br /&gt;
== Active Directory ==&lt;br /&gt;
&lt;br /&gt;
Active Directory General Tools &amp;amp; resources you may find useful for learning.&lt;br /&gt;
&lt;br /&gt;
See [[Active Directory]] for learning resources and tools.&lt;br /&gt;
&lt;br /&gt;
== Antivirus &amp;amp; EDR Evasion ==&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/&lt;br /&gt;
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/&lt;br /&gt;
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/&lt;br /&gt;
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0&lt;br /&gt;
* https://www.ired.team/offensive-security/defense-evasion&lt;br /&gt;
* https://www.youtube.com/watch?v=UO3PjJIiBIE&lt;br /&gt;
* https://github.com/matterpreter/DefenderCheck&lt;br /&gt;
* https://github.com/RythmStick/AMSITrigger&lt;br /&gt;
* https://amsi.fail&lt;br /&gt;
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20AMSI%20Bypass.md https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology and Resources/Windows - AMSI Bypass.md]&lt;/div&gt;</summary>
		<author><name>Booda</name></author>
	</entry>
</feed>