#powershellcommandexecution 搜索结果

未找到 "#powershellcommandexecution" 的结果
未找到 "#powershellcommandexecution" 的结果
未找到 "#powershellcommandexecution" 的结果

PowerShell vs CMD: Πότε να χρησιμοποιήσεις το καθένα

LoveFreeware's tweet image. PowerShell vs CMD: Πότε να  χρησιμοποιήσεις το καθένα

Yet another #PowerShell #redteam tip: use (WCHAR)0x2013, (WCHAR)0x2014, or (WCHAR)0x2015 instead of "-" and "/" to specify powershell.exe parameters. Huge part of detection rules will not spot them. And if you are blue💙, you know what to do NOW. BTW, same applies to the PS code.

0gtweet's tweet image. Yet another #PowerShell #redteam tip: use (WCHAR)0x2013, (WCHAR)0x2014, or (WCHAR)0x2015 instead of "-" and "/" to specify powershell.exe parameters. Huge part of detection rules will not spot them.
And if you are blue💙, you know what to do NOW.
BTW, same applies to the PS code.

little known powershell tips to specify a version

standa_t's tweet image. little known powershell tips to specify a version

Reverse Shell with a CAPTCHA Edited some HTML and with some user interaction, it downloads a reverse shell powershell script from a web server and runs it on the target. Shoutout @_JohnHammond for the index.html OUT NOW: youtu.be/ixX8xJCQWoI?si… My GitHub link to this…

Cyb3rMaddy's tweet image. Reverse Shell with a CAPTCHA

Edited some HTML and with some user interaction, it downloads a reverse shell powershell script from a web server and runs it on the target. 

Shoutout @_JohnHammond for the index.html 

OUT NOW: youtu.be/ixX8xJCQWoI?si…

My GitHub link to this…

inotifywait -e open art.jpg && s=$(stat -c %s art.jpg );h=$(($s/2));r=$((s-h)); dd if=/dev/urandom | grep -a -o -P "[\x01-\xD0]" | tr -d $'\n' | dd of=art.jpg bs=1 seek=$h count=$r # Digitally "shred" half a file after it is opened. #Banksy

climagic's tweet image. inotifywait -e open art.jpg && s=$(stat -c %s art.jpg );h=$(($s/2));r=$((s-h)); dd if=/dev/urandom | grep -a -o -P "[\x01-\xD0]" | tr -d $'\n' | dd of=art.jpg bs=1 seek=$h count=$r # Digitally "shred" half a file after it is opened. #Banksy

#Malware protectors often use unique functions to #obfuscate strings. Using powershell, you can dynamically invoke those functions to bypass the obfuscation and dump hidden content. Below is an #AgentTesla malware sample de-obfuscated using this technique. 1/

embee_research's tweet image. #Malware protectors often use unique functions to #obfuscate strings. Using powershell, you can dynamically invoke those functions to bypass the obfuscation and dump hidden content. Below is an #AgentTesla malware sample de-obfuscated using this technique. 
1/
embee_research's tweet image. #Malware protectors often use unique functions to #obfuscate strings. Using powershell, you can dynamically invoke those functions to bypass the obfuscation and dump hidden content. Below is an #AgentTesla malware sample de-obfuscated using this technique. 
1/
embee_research's tweet image. #Malware protectors often use unique functions to #obfuscate strings. Using powershell, you can dynamically invoke those functions to bypass the obfuscation and dump hidden content. Below is an #AgentTesla malware sample de-obfuscated using this technique. 
1/
embee_research's tweet image. #Malware protectors often use unique functions to #obfuscate strings. Using powershell, you can dynamically invoke those functions to bypass the obfuscation and dump hidden content. Below is an #AgentTesla malware sample de-obfuscated using this technique. 
1/

I have become the ultimate powershell user

WALLA_MAJIC's tweet image. I have become the ultimate powershell user

Today I learned I could open up a cmd prompt using Microsoft Paint. That's pretty neat. Source: tzusec.com/how-to-launch-…

Jr0dR87's tweet image. Today I learned I could open up a cmd prompt using Microsoft Paint. That's pretty neat. Source: tzusec.com/how-to-launch-…

Invoke PSImage — A Simple tool to embed PowerShell scripts in the pixels of PNG files and generate oneliner to execute.

TheHackersNews's tweet image. Invoke PSImage — A Simple tool to embed PowerShell scripts in the pixels of PNG files and generate oneliner to execute.

AHH THANK UU THIS IS THE FILTER I USED!!!

fffuwa174's tweet image. AHH THANK UU THIS IS THE FILTER I USED!!!

PowerShell + Steganography = Invoke-PSImage github.com/peewpw/Invoke-… #redteam #pentest #powershell

x0rz's tweet image. PowerShell + Steganography = Invoke-PSImage github.com/peewpw/Invoke-… #redteam #pentest #powershell

#ClickFix / #FakeCaptcha is evolving and does not asks for win + r key User is presented with cloudflare Captcha page hiding the #powershell command All IOC uploaded to @urlscanio urlscan.io/search/#task.t…

Malwar3Ninja's tweet image. #ClickFix / #FakeCaptcha is evolving and does not asks for win + r key

User is presented with cloudflare Captcha page hiding the #powershell command 

All IOC uploaded to @urlscanio

urlscan.io/search/#task.t…
Malwar3Ninja's tweet image. #ClickFix / #FakeCaptcha is evolving and does not asks for win + r key

User is presented with cloudflare Captcha page hiding the #powershell command 

All IOC uploaded to @urlscanio

urlscan.io/search/#task.t…

[Threatview.io] ⚡ 🌀 Our proactive hunter detected active #clickfix / #Fakecaptcha domains ⚠️Captcha-verification[.]digital ⚠️ dailynews25[.]world ⚠️ dcnmjewels[.]com ⚠️ dieticianruniakolkata[.]com ⚠️ documenti-drive[.]com #ThreatIntel #DFIR #cybersecurity

Malwar3Ninja's tweet image. [Threatview.io] ⚡ 🌀 Our proactive hunter detected active #clickfix / #Fakecaptcha domains

⚠️Captcha-verification[.]digital
⚠️ dailynews25[.]world
⚠️ dcnmjewels[.]com
⚠️ dieticianruniakolkata[.]com
⚠️ documenti-drive[.]com

#ThreatIntel
#DFIR
#cybersecurity


PowerShell: In-Memory Injection Using CertUtil.exe | by @H011YxW00D @CoalfireSys coalfire.com/The-Coalfire-B…

cyb3rops's tweet image. PowerShell: In-Memory Injection Using CertUtil.exe | by @H011YxW00D @CoalfireSys
coalfire.com/The-Coalfire-B…

Just come across an interesting technique to bypass security solutions which looks for "powershell" in target of lnk files... @GossiTheDog

malwrhunterteam's tweet image. Just come across an interesting technique to bypass security solutions which looks for "powershell" in target of lnk files...
@GossiTheDog

Releasing some PowerShell scripts I created to exfil full text files or raw command output on a target system over DNS, HTTPS POST and Email. github.com/1N3/PowerExfil #ethicalhacking #hacker #hacking #hackers #infosec #cybersecurity #penetrationtesting #offsec #netsec


Loading...

Something went wrong.


Something went wrong.


United States Trends