Resources
乌云 Drops 文章在线浏览
GitHub - wietze/windows-dll-hijacking: Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.
GitHub
GitHub - quentinhardy/pytmipe: Python library and client for token manipulations and impersonations for privilege escalation on Windows
GitHub
Windows API and Impersonation Part 1 - How to get SYSTEM using Primary Tokens
zc00l blog
Process Migration - tokens stealing (like a meterpreter) ~ Кибер Кака }{}{}{
Кибер Кака }{}{}{
Red Teaming/Adversary Simulation Toolkit

Linux binaries for Windows

awk, cut, wget,grep, etc binaries for windows
coreutils for Windows
UnxUtils
SourceForge

Tmux basic tricks

#new session
tmux new -s nmap
#attach created session
tmux a -t nmap
#list sessions
tmux ls
#detach
CTRL+B => d
#kill session
tmux kill-session -t myname
#----WINDOWS------------
c new window
, name window
w list windows
f find window
& kill window
. move window - prompted for a new number
:movew<CR> move window to the next unused number
#-----PANES---------------------
% horizontal split
" vertical split
o swap panes
q show pane numbers
x kill pane
⍽ space - toggle between layouts
-- MOUSE----------
CTRL+B => :set -g mouse on
or
:setw mode-keys emacs
navigate: CTRL+B => [
exit: q
Last modified 15d ago