Cardboard Iguana Security
/
tags
/
Application
/
Metasploit
Dark mode
Light mode
Search
Search
14 items with this tag.
Wednesday, December 18, 2024
Call Mimikatz from a meterpreter shell
Application/Metasploit/meterpreter
OS/Windows/ActiveDirectory
Protocol/Kerberos
AttackCycle/PrivEsc
AttackCycle/LateralMovement
AttackCycle/Exploitation
Wednesday, December 18, 2024
Exploit local Windows services
OS/Windows/Services
AttackCycle/Exploitation
Application/Metasploit/msfvenom
OS/Windows/EventLog
HowTo
Wednesday, December 18, 2024
Exploit VBA scripts with msfvenom
HowTo
Application/Metasploit/msfvenom
Language/VisualBasic
Application/Metasploit/meterpreter
Application/Excel
Application/Word
OS/Windows/WSH
Wednesday, December 18, 2024
Exploit Windows HTML applications with msfvenom
FileFormat/HTA
FileFormat/HTML
Application/Metasploit/msfvenom
AttackCycle/Exploitation
HowTo
Application/netcat
Application/Metasploit
Wednesday, December 18, 2024
Hashcat
Application/Hashcat
Application/Metasploit
AttackCycle/PrivEsc
Cryptography/Hashes/MD5
Cryptography/Hashes/SHA1
Cryptography/Hashes/MD4
Cryptography/Hashes/NT
Cryptography/Hashes/SHA256
Cryptography/Hashes/SHA512
Cryptography/Hashes/LANMAN
Cryptography/Hashes/bcrypt
Cryptography/Hashes/AS-REP
Cryptography/Hashes/TGS-REP
AttackCycle/Exploitation/AS-REPRoasting
Wednesday, December 18, 2024
John the Ripper
Application/JohnTheRipper
AttackCycle/PrivEsc
Application/Metasploit
Application/grep
Application/cewl
Application/CUPP
Application/Hashcat
Cryptography/Hashes
Application/SSH
Wednesday, December 18, 2024
Load a shell with a simple executable
HowTo
AttackCycle/Exploitation
Application/Metasploit/msfvenom
Language/Bash
Wednesday, December 18, 2024
Metasploit MS SQL modules
Application/MSSQL
Application/Metasploit
Application/Nmap
AttackCycle/Reconnaissance
AttackCycle/Exploitation
AttackCycle/Exploitation/BruteForcing
Wednesday, December 18, 2024
meterpreter
Application/Metasploit/meterpreter
AttackCycle/Exploitation
AttackCycle/Reconnaissance
AttackCycle/AntiForensics
Cryptography/Hashes/NT
OS/Windows/SAM
AttackCycle/PrivEsc/GoldenTickets
Application/Mimikatz
OS/Windows/EventLog
Application/PowerShell
AttackCycle/PrivEsc
OS/Windows/LSASS
Wednesday, December 18, 2024
msfconsole
Application/Metasploit/msfconsole
AttackCycle/CommandAndControl
AttackCycle/AntiForensics
AttackCycle/Exploitation
Application/SSH
Application/Nmap
Protocol/TCP
Protocol/UDP
Protocol/HTTP
Protocol/SMB
Protocol/SMTP
Application/MySQL
AttackCycle/Exploitation/BruteForcing
Cryptography/Hashes/NT
Application/Metasploit/msfvenom
Application/Metasploit/meterpreter
Application/PsExec
OS/Windows
Application/JohnTheRipper
Protocol/RDP
AttackCycle/LateralMovement
Application/proxychains
Protocol/SOCKS
Wednesday, December 18, 2024
msfvenom
Application/Metasploit/msfvenom
AttackCycle/Exploitation
Application/netcat
OS/Linux
OS/Windows
OS/macOS
FileFormat/HTA
Application/Metasploit/meterpreter
Language/VisualBasic
Language/Bash
Language/Python
Language/Perl
Language/PHP
Language/Java
Wednesday, December 18, 2024
netcat
Application/netcat
AttackCycle/Exploitation/XSS
AttackCycle/Exploitation/SQLi
AttackCycle/LateralMovement
Application/Nmap
Protocol/TCP
Protocol/UDP
Application/Metasploit/msfvenom
AttackCycle/Reconnaissance
Wednesday, December 18, 2024
SQLMap
Application/SQLMap
AttackCycle/Exploitation/SQLi
Application/Metasploit/meterpreter
Application/MySQL
Application/PostgreSQL
Wednesday, December 18, 2024
Useful scripts for Windows reconnaissance
AttackCycle/Reconnaissance
OS/Windows
Application/WinPEAS
Application/Metasploit
Application/WindowsExploitSuggester
OS/Windows/Defender
Application/PowerShell/PowerUp
Application/Metasploit/meterpreter
Application/systeminfo