• OSCP - Useful Resources
  • Introduction
  • Information Gathering/Reconnaissance
  • Port Scanning
  • Backdoors/Web Shells
  • Local File Inclusion/Remote File Inclusion
  • Shell Spawning
  • Windows Privilege Escalation
  • Linux Privilege Escalation
  • Fuzzing Payloads
  • Metasploit
  • MSFVenom
  • File Transfer
  • Samba (SMB)
  • Windows Post-Exploitation
  • Linux Post-Exploitation
  • Pivoting
  • Buffer Overflows
  • Remote Desktop Protocol (RDP)
  • SQL Injection
  • Password Cracking
  • Pre-Exam Prep
  • Cross-Compilation
  • Jailed Shell Escape
  • General Notes
Powered by GitBook

Windows Post-Exploitation

Windows Post-Exploitation

  1. https://github.com/gentilkiwi/mimikatz/releases/
  2. https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa
  3. http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdf
  4. https://github.com/PowerShellMafia/PowerSploit
  5. https://github.com/gentilkiwi/mimikatz/releases
  6. http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdf
  7. https://github.com/mubix/post-exploitation/wiki/windows

results matching ""

    No results matching ""