-
import "pe"
rule WannaCry_Ransomware_Dropper
{
meta:
description = "WannaCry Ransomware Dropper"
reference = "https://www.cylance.com/en_us/blog/threat-spotlight-inside-the-wannacry-a…
-
Thanks for the improvements in this last version.
I notice that the Costumes and the Backgrounds now open a window that shows the images, which is a good feature. Is the import button still beening…
nmrds updated
7 years ago
-
Currently, users have to configure an error queue in order for an endpoint to startup correctly. If no error queue is configured, NServiceBus throws an exception on start.
This has a huge impact on t…
-
Hello guys,
I just came across your project and I've built something really similar called [DET (Data Exfiltration Toolkit)](https://github.com/sensepost/det) which does data exfiltration with multi…
-
I want to perform an interactive logon (as if a user entered credentials) by running a powershell command when the workstation is locked.
```
Import-Module C:\Temp\Invoke-CredentialInjection.ps1
Invo…
-
## Empire Version
#
#3/31/2015 - RELEASE 1.5
-Encompasses all changes since the 1.4 tagged release
## 3/31/2016
-Merge of Inveigh 1.1 update and privesc/tater
-Updated of Invoke-Mimikatz.ps1 source…
-
Ahah
Still about this
https://github.com/PowerShellMafia/PowerSploit/issues/85#issuecomment-164651757
"Run the following:
It returns '64-bit' then line 284 cannot execute."
I know it's meaning.
I use…
-
ciao @antisnatchor,
sorry for the spam :P while updating my beef-api bindings I seem to have found a bug when listing ARE rules, you can see I've loaded only two rules:
``` bash
[byt3bl33d3r@pwnb0x b…
-
Raised by an anonymous user on my blog:
http://www.labofapenetrationtester.com/2013/08/powerpreter-and-nishang-Part-1.html?showComment=1425521883045#c1183207693915153071
Awesome work! I have a questi…
-
First I thought I messed up the config file , but then I did 3 fresh installs and problem persists ; (v 5.4.7)
(2) Website Attack Vectors
(1) Java Applet Attack Method
(2) Site Cloner
(2) Windows Rev…