Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 08/21/19 in all areas

  1. Vrei un cod? Baietii cu cod, sunteti chemati.
    1 point
  2. Felicitari! Chiar ca le mai ridici standardele. La asta nu am primit niciodata raspuns (2016) Nu am mai verificat intre timp sa vad ce au mai updatat. "Please note that you code is not obfuscated. I was able to decompile it with JetBrains dotPeek. All your exe and dll files are written with net framework 4.6, I can see all project references. Also checked Library->Samples folder and because .xaml files are in plain text an attacker can easy manipulate those one. Thank you for reading this and please be more carefull next time. Best regards." Mi s-a parut ciudat ca e partener la defcamp. Folosesc tot UiAutomation de la Microsoft? https://docs.microsoft.com/en-us/windows/win32/winauto/entry-uiauto-win32
    1 point
  3. REBEL-FRAMEWORK - Official Link automate the automation MODULES SCREENSHOTS DEMOS
    1 point
  4. Invisi-Shell - Official Link Hide your powershell script in plain sight! Invisi-Shell bypasses all of Powershell security features (ScriptBlock logging, Module logging, Transcription, AMSI) by hooking .Net assemblies. The hook is performed via CLR Profiler API. Work In Progress This is still a preliminary version intended as a POC. The code works only on x64 processes and tested against Powershell V5.1. Usage Copy the compiled InvisiShellProfiler.dll from /x64/Release/ folder with the two batch files from the root directory (RunWithPathAsAdmin.bat & RunWithRegistryNonAdmin.bat) to the same folder. Run either of the batch files (depends if you have local admin privelledges or not) Powershell console will run. Exit the powershell using the exit command (DON'T CLOSE THE WINDOW) to allow the batch file to perform proper cleanup.
    1 point
  5. Le mai ridici si lor standardele
    1 point
×
×
  • Create New...