# malicious.link
About
Brandon
Categories
Posts
Start
Tags
# malicious.link
Cancel
About
Brandon
Categories
Posts
Start
Tags
All Categories
rant
Alive Again
Problems with blogging software
Who is on your dream team red team?
GPU Cracking Complaints
Insider Threat Testing
More >>
metasploit
Installing Metasploit Community Edition on Windows 8
Metasploit Minute - Mondays with Mubix - Episode 1
Using Mimikatz Alpha or Getting Clear Text Passwords with a Microsoft Tool
Sessiondump Meterpreter Extension
Metasploit Mastery @BlackHatEvents USA 2013
More >>
internet
Suggestions on what to do when a service you use gets compromised
Companies that give back with free tools
Shared Links
First day of a No Starch Christmas - Winner
Wim Remes (@wimremes) for (ISC)2 Board of Directors
More >>
meterpreter
Using Mimikatz Alpha or Getting Clear Text Passwords with a Microsoft Tool
Sessiondump Meterpreter Extension
Finding Admin Access
BypassUAC got a facelift
Mounting SMB shares over Meterpreter
More >>
cons
Attacker Ghost Stories - ShmooCon 2014
Metasploit Mastery @BlackHatEvents USA 2013
ShmooCon 2013 Streaming
Metasploit Mastery meets CanSecWest
Dirty Little Secrets They Didn't Teach You In Pentest Class - Part 2 (Video)
More >>
tools
Mounting NFS shares through Meterpreter with NfSpy
Compile NFSShell on Ubuntu
UAC AlwaysNotify Bypass-ish
Compiling and Release of Ditto
Compiling and Release of Netview
More >>
presentations
Installing Metasploit Community Edition on Windows 8
Metasploit Minute - Mondays with Mubix - Episode 1
Dirty Little Secrets They Didn't Teach You In Pentest Class - Part 2 (Video)
phDays in Moscow
How to Win CCDC - Slides
More >>
shmoocon
Attacker Ghost Stories - ShmooCon 2014
ShmooCon 2013 Streaming
ShmooCon Tools
The Middler gets released at ShmooCon!
Podcasters Meetup at ShmooCon
More >>
cracking
Volume Shadow Copy NTDS.DIT Domain Hashes Remotely - Part 2
Volume Shadow Copy NTDS.dit Domain Hashes Remotely - Part 1
Length Sorting Wordlists
Intro to White Chapel
lm2ntlm with John the Ripper
More >>
Hacking
The Root of All Evil-(grade)
Crazed Bovine Traversal in RL
Multi-Boot Security LiveCD DVD
DEFCON 16: The Tools not the Toools
Defcon presents come early!
More >>
podcasts
grmn00bs podcast
Time, Fedora, and other things 42 related.
Hak.5 Episode 9
SploitCast, a Feburary baby, ShmooCon and Tax season
SploitCast hits the shelves!
More >>
cli
Hostname bruteforcing on the cheap
Dumping a domain worth of passwords with mimikatz
Query all windows services config from the command line
Length Sorting Wordlists
Delete TrustedInstaller-only Files and Folders
More >>
hak5
Metasploit Minute - Mondays with Mubix - Episode 1
Hak5 Segment Sneak Peak
OzymanDNS - Tunneling SSH over DNS
Maltego 2 and beyond - Part 1
Hak.5 Episode 9
More >>
railgun
Raising Zombies in Windows: Part 1 - Passwords
Integration of Mimikatz into Metasploit Stage1
(UAC) User Assisted Compromise
IP Resolution Using Meterpreter’s Railgun
Railgun Error Checking
More >>
ccdc
How to Win CCDC - Slides
Psychological Warfare with NirCMD
PHP Web Shell
Issue a Linux command without it going into history
Destructive DOSKEY aliases
More >>
dns
Iterative DNS Brute Forcing
Hostname bruteforcing on the cheap
Changing proxychains hardcoded DNS server
AXFR for DNSSEC: DNSSEC Walker
A @textfiles approach at gathering the world's DNS - Slides
More >>
releases
Stealing passwords every time they change
Compiling and Release of Ditto
Compiling and Release of Netview
Hak5 Segment Sneak Peak
Burp Suite v1.2 Released
More >>
mimikatz
Dumping a domain worth of passwords with mimikatz
Using Mimikatz Alpha or Getting Clear Text Passwords with a Microsoft Tool
Sessiondump Meterpreter Extension
Completely In-memory Mimikatz with Metasploit
Integration of Mimikatz into Metasploit Stage1
More >>
training
Metasploit Mastery @BlackHatEvents USA 2013
Metasploit Mastery meets CanSecWest
Cyber Pickpocketing
Free Ticket Contest - Metasploit Mastery at DerbyCon
DerbyCon Training (Sep 27-28 2012)
More >>
burp
@RSnake ’s RFI List in Burp Suite
Brute-Forcing Compatibility
Burp Tip of the Day - Nikto db import
Burp Suite v1.2 Released
derbycon
Dirty Little Secrets They Didn't Teach You In Pentest Class - Part 2 (Video)
Free Ticket Contest - Metasploit Mastery at DerbyCon
DerbyCon Training (Sep 27-28 2012)
The Dirty Little Secrets They Didn't Teach You In Pentesting Class
family
Michael Noah Fuller a.k.a. Mubix 2.1
Happy Mother's Day
Alexander the Great. It's a boy!
Happy Valentines Day!
gaming
StarCraft 2
Technical Difficulties
Game Commentator’s Association
America's Army: Kicking KDE to the Kurb
novahackers
NoVA Hackers - 3 years old and still going strong
Offensive and Defensive SSH Patching at NoVA Hackers
NoVA Hackers
Local Security - DC-NoVA-MD
post exploitation
Post Exploitation Command Lists - Request to Edit
SUDOERS Commented Includes used for Evil
Post Exploitation with PhantomJS
Post Exploitation Command Lists
egress
LetMeOutOfYour.NET – Server Build
LetMeOutOfYour.NET – Intro
Ear Trumpet
iphone
Jailbreak SSH horrors strike back
Get off my lawn! iPhone Geo Blocking
My iPhone runs Windows
java
Attacker Ghost Stories - ShmooCon 2014
Blocking Java Exploits, Malicious Signed Applets, and 0days
EXE::Custom in Metasploit's Java Exploits
Microsoft
Windows Vista Compatibility
Microsoft. What are you doing?!
BitLocker
payloads
Metasploit Payloads Explained - Part 1b
Metasploit Payloads Explained - Part 1a
Metasploit Payloads Explained - Part 1
podcasting
Podcasters Meetup at ShmooCon
Hacker Media
TechTV Holiday Meetup
proxy
Changing proxychains hardcoded DNS server
Setting SYSTEM's proxy settings with Metasploit
Lab Setup - Windows Proxy and Egress Filtering
scripting
Iterative DNS Brute Forcing
Populating Your Virtual Victim Domain
Metasploit VNC Password Extraction
social engineering
Social Engineering Challenges Back
Social Engineering Challenge #1 Answer
Social Engineering Challenge #1
ssh
Free Shells with Plink and Pageant
Disconnect Stalled SSH Session
Offensive and Defensive SSH Patching at NoVA Hackers
uac
BypassUAC got a facelift
UAC AlwaysNotify Bypass-ish
(UAC) User Assisted Compromise
windows
Minimum Password Length of 15 or more via GPO
Metasploit on Wintel Systems
Windows Vista: Piracy protection
wishlist
2009 Geek Christmas List
Security Tools I'm Looking For Part I
Birthday Wishes
antivirus
AV Tracker
AV bypass made stupid
defense
Attacker Ghost Stories - ShmooCon 2014
Blocking Java Exploits, Malicious Signed Applets, and 0days
friends
Another Baby!
It's a Girl!
ideas
Security Tools I'm Looking For Part I
Retractions - Web App and SAMBA
iexpress
Metasploit <3s Microsoft
Metasploit heart's Microsoft
ipv6
IPv6 Attacks
Revenge of the Bind Shell
kindle
Kindle 2 Review: Putting The Fire Out
2 Kindle or Not(ebook) 2 Kindle
lab
Lab Setup - Windows Proxy and Egress Filtering
Populating Your Virtual Victim Domain
lnk
Developing the LNK Metasploit post module with Mona
MS08_068 + MS10_046 = FUN UNTIL 2018
maltego
Maltego 2 and beyond - Part 3
Maltego 2 and beyond - Part 2
metasploit minute
Installing Metasploit Community Edition on Windows 8
Metasploit Minute - Mondays with Mubix - Episode 1
nbns
Old School On-target NBNS Spoofing - Part 2
Old School On-target NBNS Spoofing
nfs
Mounting NFS shares through Meterpreter with NfSpy
Creating Vulnerabilities: NFS Exports
nostarch
First day of a No Starch Christmas - Winner
12 Days of No Starch Press
passwords
Dumping NTDS.dit domain hashes using Samba
Stealing passwords every time they change
ruby
Populating Your Virtual Victim Domain
Metasploit with Ruby 1.9.1
script
Rapid fire PSEXEC for Metasploit
Set Wallpaper Meterpreter Script
shadowcopy
Volume Shadow Copy NTDS.DIT Domain Hashes Remotely - Part 2
Volume Shadow Copy NTDS.dit Domain Hashes Remotely - Part 1
smbrelay
Cross-Protocol Chained Pass the Hash for Metasploit
MS08_068 + MS10_046 = FUN UNTIL 2018
speaking
Speaking 102 - The Audience Perspective
Speaking Evolved
sploitcast
SploitCast, a Feburary baby, ShmooCon and Tax season
SploitCast hits the shelves!
techphile
Hak.5 and techPhile merge for a day.
What happened!?
techtv
TechTV Holiday Meetup
TechTV back from the dead?
thoughts
Random Thoughts - Web App Hacking
Using SAMBA to crack Unix passwords
travel
An Interesting Flight
100+ Photos Posted!
tv
Time, Fedora, and other things 42 related.
Images from Leaked LOST episode
usb
USB Goodies 2008
Hak.5 Episode 9
vnc
Metasploit VNC Password Extraction
Meterpreter tunneling and VNC revamped
analogx
Lab Setup - Windows Proxy and Egress Filtering
appsec
RSA Dun-got hacked! APT etc..
apt
RSA Dun-got hacked! APT etc..
attackers
RSA Dun-got hacked! APT etc..
auroa
RSA Dun-got hacked! APT etc..
autoit
Hak5 Segment Sneak Peak
av
Notepad is a virus
backtrack
Hackers are STUCK!
blogging
SBN move to Lijit
brandon
Brandon's Birthday
cachedump
Cachedump for Meterpreter in action
cansecwest
Metasploit Mastery meets CanSecWest
ccckc
The Cowtown Computer Congress Opens Their Underground Lab
certifications
Offensive Security Certified Professional
cissp
Wim Remes (@wimremes) for (ISC)2 Board of Directors
clipboard
Hak5 Segment Sneak Peak
command lists
Post Exploitation Command Lists
common sense
Acceptable Questions Checklist
competition
Winning Hacker Competitions as Defenders
csi
Free Pass to CSI 2008
cuda
GPU Hash / Password Cracking
cyberpickpocket
Cyber Pickpocketing
dan kaminskey
OzymanDNS - Tunneling SSH over DNS
deepmagic
A @textfiles approach at gathering the world's DNS - Slides
delicious
Delicious Webapp Hacking
dig
Hostname bruteforcing on the cheap
ditto
Compiling and Release of Ditto
dllinjection
Remote DLL Injection with Meterpreter
doskey
Destructive DOSKEY aliases
emet
Attacker Ghost Stories - ShmooCon 2014
evilbadguys
RSA Dun-got hacked! APT etc..
excuses
Confusion and Delay
facebook
Hacking Crazy Taxi
firefox
Memory Forensics for Pentesters: Part 1
forensics
Memory Forensics for Pentesters: Part 1
fud
RSA Dun-got hacked! APT etc..
full disclosure
Microsoft ignores another 0 day 'feature'
google docs
Post Exploitation Command Lists - Request to Edit
gpu
GPU Cracking Complaints
group policy
Minimum Password Length of 15 or more via GPO
guest posts
Jasager: On the Defensive
guestpost
Hacking Crazy Taxi
hacker spaces
The Cowtown Computer Congress Opens Their Underground Lab
Hak.5
Hak.5 Radio goes legit
hardware
BSODomizer - Cube Warfare and Beyond
hashdump
Dumping Hashes on Win2k8 R2 x64 with Metasploit
hfc
The Academy is giving away money!
homage
Homage to Don Knotts
honey pot
Project Honeypot HTTP Blocklist module
iis
IIS Search Verb Directory Listing
impacket
Executing code via SMB / DCOM without PSEXEC
incident response
Evidence of Compromise - Metasploit's PSEXEC
infogathering
SHODAN The Computer Search
iptables
LetMeOutOfYour.NET – Server Build
isc2
Wim Remes (@wimremes) for (ISC)2 Board of Directors
jailbreak
Jailbreak SSH horrors strike back
japan
100+ Photos Posted!
jasager
Jasager - Past - Present and Future
john the ripper
Multiple Dictionaries or Wordlists Using John the Ripper
jtr
lm2ntlm with John the Ripper
links
Shared Links
linux
SUDOERS Commented Includes used for Evil
livecd
Hackers are STUCK!
metadata
Get off my lawn! iPhone Geo Blocking
methodology
Presence, Persistence, and Pivoting
mod_rewrite
LetMeOutOfYour.NET – Server Build
mona
Developing the LNK Metasploit post module with Mona
movies
Reinvention of 007 + Back to the future = Really dumb idea
msfconsole
MSFConsole Prompt Fiddling
netview
Compiling and Release of Netview
news
A Simplified Astaro UTM now FREE to businesses
nikto
Burp Tip of the Day - Nikto db import
nircmd
Psychological Warfare with NirCMD
ntds.dit
Dumping NTDS.dit domain hashes using Samba
packers
Runtime Packers - hold the cheese
pass the hash
Pass the Hash Metasploit Demo
passivex
PassiveX fun with Metasploit
passthehash
Pass the Hash without Metasploit - Part 2
peerblock
Lab Setup - Windows Proxy and Egress Filtering
pentesting
The Dirty Little Secrets They Didn't Teach You In Pentesting Class
persistance
Sticky Keys and Utilman against NLA
persistence
fxsst.dll persistence: the evil fax machine
phantomjs
Post Exploitation with PhantomJS
pivoting
0Exploit Privilege Escalation
portable apps
USB Goodies 2008
post modules
Run POST Modules On All Sessions
postcasters meetup
Podcaster's Meetup @ ShmooCon Update 1
pragmatk
Hacking Crazy Taxi
pranks
BSODomizer - Cube Warfare and Beyond
press release
The Cowtown Computer Congress Opens Their Underground Lab
privesc
Query all windows services config from the command line
proxychains
Changing proxychains hardcoded DNS server
psexec
Evidence of Compromise - Metasploit's PSEXEC
pth
Cross-Protocol Chained Pass the Hash for Metasploit
putty
Free Shells with Plink and Pageant
references
Resources for railgun development
resource files
Rapid fire PSEXEC for Metasploit
reverse-engineering
Getting your fill of Reverse Engineering and Malware Analysis
review
Kindle 2 Review: Putting The Fire Out
robin wood
Ear Trumpet
room362
Why Room362?
RSA
RSA Photos
rsnake
@RSnake ’s RFI List in Burp Suite
samba
Dumping NTDS.dit domain hashes using Samba
sep
Silently uninstall SEP
services
Query all windows services config from the command line
sethc
Sticky Keys and Utilman against NLA
sharedlinks
Whitedust.net
smb
Mounting SMB shares over Meterpreter
sudo
SUDOERS Commented Includes used for Evil
symantec
Silently uninstall SEP
technocrat
Google Earth SKY Easteregg
theacademy
The Academy is giving away money!
tivo
TiVo for the Economically Unstimulated
traning
Offensive Security Live Courses for 2009
trendmicro
Bypassing Trend Micro's Service Protection
tutorials
Practical Exploitation
Uncategorized
Hash Types for John the Ripper
update
Updated: Password and Word lists
usmc
Promotion to Sergeant.
utilman
Sticky Keys and Utilman against NLA
video
Offensive and Defensive SSH Patching at NoVA Hackers
wayback
Wayback Webapp Hacking
web
Post Exploitation with PhantomJS
webshell
PHP Web Shell
whitechapel
Intro to White Chapel
windows 8
Installing Metasploit Community Edition on Windows 8
wireless
Linksys WRT54G Ultimate Hacking
wmi
Executing code via SMB / DCOM without PSEXEC
wmis
Executing code via SMB / DCOM without PSEXEC
wordlists
Password / Word lists
x64
Create a 64bit Process From a x86/32bit One