Techniques
First cat out the proxychains file cat /etc/proxychains4.conf at the bottom look […]
This is the process I use to see which extensions may be […]
This is a technique that can be used to retrieve any Google […]
Mimikatz is a very popular and powerful post-exploitation tool most commonly used […]
Mimikatz is a very popular and powerful post-exploitation tool mainly used for […]
Embedding Malware in PDFs Launch Metasploit search adobe_pdf set options set Payload […]
Creating custom payloads can be useful as detection tools can recognize security […]
*After obtaining Admin access* The tool of choice is built into Windows. […]
python -c “import pty; pty.spawn(‘/bin/bash’)” Running this command should allow you to […]
Background the session that is open run the command search shell_to_meterpreter use 0 […]